Baudry)
replace 'Baudry)' by '(Badry)'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
Fitzgerald,);
replace 'Fitzgerald,);' by 'Fitzgerald,'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
-Getstera-Arteaga);
delete '-Getstera-Arteaga);' by ''
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
eeUh
replace 'eeUh' by 'Getstera-Arteaga);'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
[tHuysknatiseeas
replace '[tHuysknatiseeas' by '-'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
authors
replace 'authors' by 'eeUh'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
“Corresponding
replace '“Corresponding' by '[tHuysknatiseeas'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
replacements.
replace 'replacements.' by 'authors'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
code
replace 'code' by '“Corresponding'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
equivalent
replace 'equivalent' by 'replacements.'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
functionally
replace 'functionally' by 'code'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
with
replace 'with' by 'equivalent'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
binary
replace 'binary' by 'functionally'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
WebAssembly
replace 'WebAssembly' by 'with'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
transforming
replace 'transforming' by 'binary'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
through
replace 'through' by 'WebAssembly'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
achieved
replace 'achieved' by 'transforming'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
[20],
replace '[20],' by 'through'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
2021
replace '2021' by 'achieved'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
in
replace 'in' by '[20],'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
Fastly
replace 'Fastly' by '2021'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
insert '' by 'Fastly'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
insert '' by 'in'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
opti-mization
replace 'opti-mization' by 'optimization'
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)optimization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. “Corresponding (71)authors (72)[tHuysknatiseeas (73)eeUh (74)- (75)Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. Fitzgerald,); (77)monperrus@kth.se (78)(M. Monperrus); (79)baudryekth.se (80)(B. Baudry) (81)ORCID(s): (82)0000-0001-9399-8647 (83)(J. Cabrera-Arteaga); (84)0000-0002-0209-2805 (85)(N. Fitzgerald, (86)0000-0003-3505-3383 (87)(M. Monperrus); (88)0000-0002-4015-4640 (89)(B. (Badry)
(0)Software (1)diversification (2)is (3)a (4)well-known (5)software (6)pro-tection (7)technique (8)[13, (9)5, (10)21], (11)consisting (12)of (13)producing (14)numerous (15)variants (16)of (17)an (18)original (19)program, (20)each (21)retaining (22)equivalent (23)functionality. Software (24)diversification (25)in (26)Web-Assembly (27)has (28)several (29)application (30)domains, (31)such (32)as (33)opti-mization (34)[6] (35)and (36)malware (37)evasion (38)[8] (39)research. It (40)can (41)also (42)be (43)used (44)for (45)fuzzing, (46)an (47)example (48)of (49)this (50)was (51)the (52)discovery (53)of (54)a (55)CVE (56)in (57)Fastly (58)in (59)2021 (60)[20], (61)achieved (62)through (63)transforming (64)WebAssembly (65)binary (66)with (67)functionally (68)equivalent (69)code (70)replacements. (71)“Corresponding (72)authors (73)[tHuysknatiseeas (74)eeUh (75)-Getstera-Arteaga); (76)nfitzgerald@fastly.com(N. (77)Fitzgerald,); (78)monperrus@kth.se (79)(M. Monperrus); (80)baudryekth.se (81)(B. Baudry) (82)ORCID(s): (83)0000-0001-9399-8647 (84)(J. Cabrera-Arteaga); (85)0000-0002-0209-2805 (86)(N. Fitzgerald,); (87)0000-0003-3505-3383 (88)(M. (89)Monperrus); (90)0000-0002-4015-4640 (91)(B. Baudry)
“
Unpaired symbol: ‘”’ seems to be missing
Software diversification is a well-known software pro-tection technique [13, 5, 21], consisting of producing numerous variants of an original program, each retaining equivalent functionality. Software diversification in Web-Assembly has several application domains, such as opti-mization [6] and malware evasion [8] research. It can also be used for fuzzing, an example of this was the discovery of a CVE in Fastly in 2021 [20], achieved through transforming WebAssembly binary with functionally equivalent code replacements. “Corresponding authors [tHuysknatiseeas eeUh -Getstera-Arteaga); nfitzgerald@fastly.com(N. Fitzgerald,); monperrus@kth.se (M. Monperrus); baudryekth.se (B. Baudry) ORCID(s): 0000-0001-9399-8647 (J. Cabrera-Arteaga); 0000-0002-0209-2805 (N. Fitzgerald,); 0000-0003-3505-3383 (M. Monperrus); 0000-0002-4015-4640 (B. Baudry)
insert '' by 'to'
(0)1. Introduction (1)Introduction (2)to (3)Introduction (4)to (5)Introduction (6)to (7)Introduction (8)to (9)Introduction (10)to (11)Introduction (12)to (13)Introduction (14)to (15)Introduction (16)to (17)Introduction (18)to (19)Introduction (20)to (21)Introduction (22)to (23)Introduction (24)to (25)Introduction (26)to (27)Introduction (28)to (29)Introduction (30)to (31)Introduction (32)to (33)Introduction (34)to (35)Introduction (36)to (37)Introduction (38)to (39)Introduction (40)to (41)Introduction (42)to (43)Introduction (44)to (45)Introduction (46)to (47)Introduction (48)to (49)Introduction (50)to (51)Introduction (52)to (53)Introduction (54)to (55)Introduction (56)to (57)Introduction (58)to (59)Introduction (60)to (61)Introduction (62)to (63)Introduction (64)to (65)Introduction (66)to (67)Introduction (68)to (69)Introduction (70)to (71)Introduction (72)to (73)Introduction (74)to (75)Introduction (76)to (77)Introduction (78)to (79)Introduction (80)to (81)Introduction (82)to (83)Introduction (84)to (85)Introduction (86)to (87)Introduction (88)to (89)Introduction (90)to (91)Introduction (92)to (93)Introduction (94)to (95)Introduction (96)to (97)Introduction (98)to (99)Introduction (100)to (101)Introduction (102)to (103)Introduction (104)to (105)Introduction (106)to (107)Introduction (108)to (109)Introduction (110)to (111)Introduction (112)to
(0)1. Introduction
insert '' by 'Introduction'
(0)1. Introduction (1)Introduction (2)to (3)Introduction (4)to (5)Introduction (6)to (7)Introduction (8)to (9)Introduction (10)to (11)Introduction (12)to (13)Introduction (14)to (15)Introduction (16)to (17)Introduction (18)to (19)Introduction (20)to (21)Introduction (22)to (23)Introduction (24)to (25)Introduction (26)to (27)Introduction (28)to (29)Introduction (30)to (31)Introduction (32)to (33)Introduction (34)to (35)Introduction (36)to (37)Introduction (38)to (39)Introduction (40)to (41)Introduction (42)to (43)Introduction (44)to (45)Introduction (46)to (47)Introduction (48)to (49)Introduction (50)to (51)Introduction (52)to (53)Introduction (54)to (55)Introduction (56)to (57)Introduction (58)to (59)Introduction (60)to (61)Introduction (62)to (63)Introduction (64)to (65)Introduction (66)to (67)Introduction (68)to (69)Introduction (70)to (71)Introduction (72)to (73)Introduction (74)to (75)Introduction (76)to (77)Introduction (78)to (79)Introduction (80)to (81)Introduction (82)to (83)Introduction (84)to (85)Introduction (86)to (87)Introduction (88)to (89)Introduction (90)to (91)Introduction (92)to (93)Introduction (94)to (95)Introduction (96)to (97)Introduction (98)to (99)Introduction (100)to (101)Introduction (102)to (103)Introduction (104)to (105)Introduction (106)to (107)Introduction (108)to (109)Introduction (110)to (111)Introduction (112)to
(0)1. Introduction
swiftly
replace 'swiftly' by 'rapidly'
(0)ABSTRACT (1)WebAssembly (2)is (3)the (4)fourth (5)officially (6)endorsed (7)Web (8)language. It (9)is (10)recognized (11)because (12)of (13)its (14)efficiency (15)and (16)design, (17)focused (18)on (19)security. Yet, (20)its (21)rapidly (22)expanding (23)ecosystem (24)lacks (25)robust (26)software (27)diversification (28)systems. We (29)introduce (30)WASM-MUTATE, (31)a (32)diversification (33)engine (34)specifically (35)designed (36)for (37)WebAssembly. Our (38)engine (39)meets (40)several (41)essential (42)criteria: (43)1) (44)To (45)quickly (46)generate (47)functionally (48)identical, (49)yet (50)behaviorally (51)diverse, (52)WebAssembly (53)variants, (54)2) (55)To (56)be (57)universally (58)applicable (59)to (60)any (61)WebAssembly (62)program, (63)irrespective (64)of (65)the (66)source (67)programming (68)language, (69)and (70)3) (71)Generated (72)variants (73)should (74)counter (75)side-channels. By (76)leveraging (77)an (78)e-graph (79)data (80)structure, (81)WASM-MUTATE (82)is (83)implemented (84)to (85)meet (86)both (87)speed (88)and (89)efficacy. We (90)evaluate (91)WASM-MUTATE (92)by (93)conducting (94)experiments (95)on (96)404 (97)programs, (98)which (99)include (100)real-world (101)applications. Our (102)results (103)highlight (104)that (105)WASM-MUTATE (106)can (107)produce (108)tens (109)of (110)thousands (111)of (112)unique (113)and (114)efficient (115)WebAssembly (116)variants (117)within (118)minutes. Significantly, (119)WASM-MUTATE (120)can (121)safeguard (122)WebAssembly (123)binaries (124)against (125)timing (126)side-channel (127)attacks, (128)especially (129)those (130)of (131)the (132)Spectre (133)type.
(0)ABSTRACT (1)WebAssembly (2)is (3)the (4)fourth (5)officially (6)endorsed (7)Web (8)language. It (9)is (10)recognized (11)because (12)of (13)its (14)efficiency (15)and (16)design, (17)focused (18)on (19)security. Yet, (20)its (21)swiftly (22)expanding (23)ecosystem (24)lacks (25)robust (26)software (27)diversification (28)systems. We (29)introduce (30)WASM-MUTATE, (31)a (32)diversification (33)engine (34)specifically (35)designed (36)for (37)WebAssembly. Our (38)engine (39)meets (40)several (41)essential (42)criteria: (43)1) (44)To (45)quickly (46)generate (47)functionally (48)identical, (49)yet (50)behaviorally (51)diverse, (52)WebAssembly (53)variants, (54)2) (55)To (56)be (57)universally (58)applicable (59)to (60)any (61)WebAssembly (62)program, (63)irrespective (64)of (65)the (66)source (67)programming (68)language, (69)and (70)3) (71)Generated (72)variants (73)should (74)counter (75)side-channels. By (76)leveraging (77)an (78)e-graph (79)data (80)structure, (81)WASM-MUTATE (82)is (83)implemented (84)to (85)meet (86)both (87)speed (88)and (89)efficacy. We (90)evaluate (91)WASM-MUTATE (92)by (93)conducting (94)experiments (95)on (96)404 (97)programs, (98)which (99)include (100)real-world (101)applications. Our (102)results (103)highlight (104)that (105)WASM-MUTATE (106)can (107)produce (108)tens (109)of (110)thousands (111)of (112)unique (113)and (114)efficient (115)WebAssembly (116)variants (117)within (118)minutes. Significantly, (119)WASM-MUTATE (120)can (121)safeguard (122)WebAssembly (123)binaries (124)against (125)timing (126)side-channel (127)attacks, (128)especially (129)those (130)of (131)the (132)Spectre (133)type.
USA
replace 'USA' by 'USA.'
(0)“KTH (1)Royal (2)Institute (3)of (4)Technology, (5)Stockholm, (6)Sweden (7)» (8)Fastly (9)Inc., (10)San (11)Francisco, (12)USA.
(0)“KTH (1)Royal (2)Institute (3)of (4)Technology, (5)Stockholm, (6)Sweden (7)»Fastly (8)Inc., (9)San (10)Francisco, (11)USA
insert '' by 'Fastly'
(0)“KTH (1)Royal (2)Institute (3)of (4)Technology, (5)Stockholm, (6)Sweden (7)» (8)Fastly (9)Inc., (10)San (11)Francisco, (12)USA.
(0)“KTH (1)Royal (2)Institute (3)of (4)Technology, (5)Stockholm, (6)Sweden (7)»Fastly (8)Inc., (9)San (10)Francisco, (11)USA
»Fastly
replace '»Fastly' by '»'
(0)“KTH (1)Royal (2)Institute (3)of (4)Technology, (5)Stockholm, (6)Sweden (7)» (8)Fastly (9)Inc., (10)San (11)Francisco, (12)USA.
(0)“KTH (1)Royal (2)Institute (3)of (4)Technology, (5)Stockholm, (6)Sweden (7)»Fastly (8)Inc., (9)San (10)Francisco, (11)USA
,?
Put a space after the comma.
Javier Cabrera-Arteaga**, Nicholas Fitzgerald,?, Martin Monperrus“ and Benoit Baudry“
WebAssembly
replace 'WebAssembly' by 'WebAssembly.'
(0)WebAssembly.
(0)WebAssembly
for
delete 'for' by ''
(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for (7)Binary (8)Diversification.
(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for
Diversification
replace 'Diversification' by 'Diversification.'
(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for (7)Binary (8)Diversification.
(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for
insert '' by 'for'
(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for (7)Binary (8)Diversification.
(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for
insert '' by 'Diversification'
(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for (7)Binary (8)Diversification.
(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for
insert '' by 'Binary'
(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for (7)Binary (8)Diversification.
(0)WASM-MUTATE: (1)Fast (2)and (3)Effective (4)Binary (5)Diversification (6)for
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)| (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)| (5)of (6)25
arr
delete 'arr' by ''
(0)fn (1)main() (2) (3)let (4)mutarr (5)= (6)[1, (7)2, (8)3, (9)4, (10)5];
(0)fn (1)main() (2){ (3)let (4)mut (5)arr (6)= (7)[1, (8)2, (9)3, (10)4, (11)5];
mut
delete 'mut' by ''
(0)fn (1)main() (2) (3)let (4)mutarr (5)= (6)[1, (7)2, (8)3, (9)4, (10)5];
(0)fn (1)main() (2){ (3)let (4)mut (5)arr (6)= (7)[1, (8)2, (9)3, (10)4, (11)5];
let
replace 'let' by 'mutarr'
(0)fn (1)main() (2) (3)let (4)mutarr (5)= (6)[1, (7)2, (8)3, (9)4, (10)5];
(0)fn (1)main() (2){ (3)let (4)mut (5)arr (6)= (7)[1, (8)2, (9)3, (10)4, (11)5];
{
replace '{' by 'let'
(0)fn (1)main() (2) (3)let (4)mutarr (5)= (6)[1, (7)2, (8)3, (9)4, (10)5];
(0)fn (1)main() (2){ (3)let (4)mut (5)arr (6)= (7)[1, (8)2, (9)3, (10)4, (11)5];
to
replace 'to' by 'To'
(0)At (1)runtime, (2)WebAssembly (3)programs (4)operate (5)on (6)a (7)virtual (8)stack (9)that (10)holds (11)primitive (12)data (13)types. Such (14)data (15)is (16)then (17)operated (18)by (19)typed (20)stack (21)instructions. A (22)WebAssembly (23)program (24)also (25)declares (26)linear (27)memory (28)and (29)globals, (30)which (31)are (32)used (33)to (34)store, (35)manipulate, (36)and (37)share (38)data (39)during (40)program (41)execution, (42)e.g. To (43)share (44)data (45)with (46)the (47)host (48)engine (49)of (50)the (51)WebAssembly (52)binary. In (53)Listing (54)1, (55)we (56)provide (57)an (58)example (59)of (60)a (61)Rust (62)program (63)that (64)contains (65)a (66)function (67)declaration, (68)a (69)loop, (70)a (71)loop (72)conditional, (73)and (74)a (75)memory (76)access. When (77)the (78)Rust (79)code (80)is (81)compiled (82)to (83)WebAssembly, (84)it (85)produces (86)the (87)code (88)shown (89)in (90)Listing (91)2.
(0)Atruntime, (1)WebAssembly (2)programs (3)operate (4)on (5)a (6)virtual (7)stack (8)that (9)holds (10)primitive (11)data (12)types. Such (13)data (14)is (15)then (16)operated (17)by (18)typed (19)stack (20)instructions. A (21)WebAssembly (22)program (23)also (24)declares (25)linear (26)memory (27)and (28)globals, (29)which (30)are (31)used (32)to (33)store, (34)manipulate, (35)and (36)share (37)data (38)during (39)program (40)execution, (41)e.g. to (42)share (43)data (44)with (45)the (46)host (47)engine (48)of (49)the (50)WebAssembly (51)binary. In (52)Listing (53)1, (54)we (55)provide (56)an (57)example (58)of (59)a (60)Rust (61)program (62)that (63)contains (64)a (65)function (66)declaration, (67)a (68)loop, (69)a (70)loop (71)conditional, (72)and (73)a (74)memory (75)access. When (76)the (77)Rust (78)code (79)is (80)compiled (81)to (82)WebAssembly, (83)it (84)produces (85)the (86)code (87)shown (88)in (89)Listing (90)2.
insert '' by 'runtime,'
(0)At (1)runtime, (2)WebAssembly (3)programs (4)operate (5)on (6)a (7)virtual (8)stack (9)that (10)holds (11)primitive (12)data (13)types. Such (14)data (15)is (16)then (17)operated (18)by (19)typed (20)stack (21)instructions. A (22)WebAssembly (23)program (24)also (25)declares (26)linear (27)memory (28)and (29)globals, (30)which (31)are (32)used (33)to (34)store, (35)manipulate, (36)and (37)share (38)data (39)during (40)program (41)execution, (42)e.g. To (43)share (44)data (45)with (46)the (47)host (48)engine (49)of (50)the (51)WebAssembly (52)binary. In (53)Listing (54)1, (55)we (56)provide (57)an (58)example (59)of (60)a (61)Rust (62)program (63)that (64)contains (65)a (66)function (67)declaration, (68)a (69)loop, (70)a (71)loop (72)conditional, (73)and (74)a (75)memory (76)access. When (77)the (78)Rust (79)code (80)is (81)compiled (82)to (83)WebAssembly, (84)it (85)produces (86)the (87)code (88)shown (89)in (90)Listing (91)2.
(0)Atruntime, (1)WebAssembly (2)programs (3)operate (4)on (5)a (6)virtual (7)stack (8)that (9)holds (10)primitive (11)data (12)types. Such (13)data (14)is (15)then (16)operated (17)by (18)typed (19)stack (20)instructions. A (21)WebAssembly (22)program (23)also (24)declares (25)linear (26)memory (27)and (28)globals, (29)which (30)are (31)used (32)to (33)store, (34)manipulate, (35)and (36)share (37)data (38)during (39)program (40)execution, (41)e.g. to (42)share (43)data (44)with (45)the (46)host (47)engine (48)of (49)the (50)WebAssembly (51)binary. In (52)Listing (53)1, (54)we (55)provide (56)an (57)example (58)of (59)a (60)Rust (61)program (62)that (63)contains (64)a (65)function (66)declaration, (67)a (68)loop, (69)a (70)loop (71)conditional, (72)and (73)a (74)memory (75)access. When (76)the (77)Rust (78)code (79)is (80)compiled (81)to (82)WebAssembly, (83)it (84)produces (85)the (86)code (87)shown (88)in (89)Listing (90)2.
Atruntime,
replace 'Atruntime,' by 'At'
(0)At (1)runtime, (2)WebAssembly (3)programs (4)operate (5)on (6)a (7)virtual (8)stack (9)that (10)holds (11)primitive (12)data (13)types. Such (14)data (15)is (16)then (17)operated (18)by (19)typed (20)stack (21)instructions. A (22)WebAssembly (23)program (24)also (25)declares (26)linear (27)memory (28)and (29)globals, (30)which (31)are (32)used (33)to (34)store, (35)manipulate, (36)and (37)share (38)data (39)during (40)program (41)execution, (42)e.g. To (43)share (44)data (45)with (46)the (47)host (48)engine (49)of (50)the (51)WebAssembly (52)binary. In (53)Listing (54)1, (55)we (56)provide (57)an (58)example (59)of (60)a (61)Rust (62)program (63)that (64)contains (65)a (66)function (67)declaration, (68)a (69)loop, (70)a (71)loop (72)conditional, (73)and (74)a (75)memory (76)access. When (77)the (78)Rust (79)code (80)is (81)compiled (82)to (83)WebAssembly, (84)it (85)produces (86)the (87)code (88)shown (89)in (90)Listing (91)2.
(0)Atruntime, (1)WebAssembly (2)programs (3)operate (4)on (5)a (6)virtual (7)stack (8)that (9)holds (10)primitive (11)data (12)types. Such (13)data (14)is (15)then (16)operated (17)by (18)typed (19)stack (20)instructions. A (21)WebAssembly (22)program (23)also (24)declares (25)linear (26)memory (27)and (28)globals, (29)which (30)are (31)used (32)to (33)store, (34)manipulate, (35)and (36)share (37)data (38)during (39)program (40)execution, (41)e.g. to (42)share (43)data (44)with (45)the (46)host (47)engine (48)of (49)the (50)WebAssembly (51)binary. In (52)Listing (53)1, (54)we (55)provide (56)an (57)example (58)of (59)a (60)Rust (61)program (62)that (63)contains (64)a (65)function (66)declaration, (67)a (68)loop, (69)a (70)loop (71)conditional, (72)and (73)a (74)memory (75)access. When (76)the (77)Rust (78)code (79)is (80)compiled (81)to (82)WebAssembly, (83)it (84)produces (85)the (86)code (87)shown (88)in (89)Listing (90)2.
https://cranelift.dev/
delete 'https://cranelift.dev/' by ''
(0)e (1)An (2)open-source’ (3)repository, (4)where (5)WASM-MUTATE (6)is (7)publicly (8)available (9)for (10)future (11)research (12)https://github.com/bytecodealliance/wasm-tools/ (13)tree/main/crates/wasm-mutate. https://cranelift.dev/ (14)1 (15)https://cranelift.dev/ (16)1 (17)https://cranelift.dev/ (18)1 (19)https://cranelift.dev/ (20)1 (21)https://cranelift.dev/ (22)1 (23)https://cranelift.dev/ (24)1 (25)https://cranelift.dev/ (26)1 (27)https://cranelift.dev/ (28)1 (29)https://cranelift.dev/ (30)1 (31)https://cranelift.dev/ (32)1 (33)https://cranelift.dev/ (34)1
(0)e (1)An (2)open-source’ (3)repository, (4)where (5)WASM-MUTATE (6)is (7)publicly (8)available (9)for (10)future (11)research (12)https://github.com/bytecodealliance/wasm-tools/ (13)tree/main/crates/wasm-mutate. (14)1 (15)https://cranelift.dev/
insert '' by 'https://cranelift.dev/'
(0)e (1)An (2)open-source’ (3)repository, (4)where (5)WASM-MUTATE (6)is (7)publicly (8)available (9)for (10)future (11)research (12)https://github.com/bytecodealliance/wasm-tools/ (13)tree/main/crates/wasm-mutate. https://cranelift.dev/ (14)1 (15)https://cranelift.dev/ (16)1 (17)https://cranelift.dev/ (18)1 (19)https://cranelift.dev/ (20)1 (21)https://cranelift.dev/ (22)1 (23)https://cranelift.dev/ (24)1 (25)https://cranelift.dev/ (26)1 (27)https://cranelift.dev/ (28)1 (29)https://cranelift.dev/ (30)1 (31)https://cranelift.dev/ (32)1 (33)https://cranelift.dev/ (34)1
(0)e (1)An (2)open-source’ (3)repository, (4)where (5)WASM-MUTATE (6)is (7)publicly (8)available (9)for (10)future (11)research (12)https://github.com/bytecodealliance/wasm-tools/ (13)tree/main/crates/wasm-mutate. (14)1 (15)https://cranelift.dev/
insert '' by '1'
(0)e (1)An (2)open-source’ (3)repository, (4)where (5)WASM-MUTATE (6)is (7)publicly (8)available (9)for (10)future (11)research (12)https://github.com/bytecodealliance/wasm-tools/ (13)tree/main/crates/wasm-mutate. https://cranelift.dev/ (14)1 (15)https://cranelift.dev/ (16)1 (17)https://cranelift.dev/ (18)1 (19)https://cranelift.dev/ (20)1 (21)https://cranelift.dev/ (22)1 (23)https://cranelift.dev/ (24)1 (25)https://cranelift.dev/ (26)1 (27)https://cranelift.dev/ (28)1 (29)https://cranelift.dev/ (30)1 (31)https://cranelift.dev/ (32)1 (33)https://cranelift.dev/ (34)1
(0)e (1)An (2)open-source’ (3)repository, (4)where (5)WASM-MUTATE (6)is (7)publicly (8)available (9)for (10)future (11)research (12)https://github.com/bytecodealliance/wasm-tools/ (13)tree/main/crates/wasm-mutate. (14)1 (15)https://cranelift.dev/
WebAssembly
replace 'WebAssembly' by 'WebAssembly.'
(0)2.1. WebAssembly.
(0)2.1. WebAssembly
gen-erate
replace 'gen-erate' by 'generate'
(0)Our (1)results (2)demonstrate (3)that (4)WASM-MUTATE (5)can (6)generate (7)thousands (8)of (9)variants (10)in (11)minutes. These (12)variants (13)have (14)unique (15)machine (16)code (17)after (18)compilation (19)with (20)Cranelift! (21)(static (22)diversity) (23)and (24)the (25)variants (26)exhibit (27)different (28)traces (29)at (30)runtime (31)(dynamic (32)diversity). Moreover, (33)we (34)empirically (35)demonstrate (36)that, (37)in (38)the (39)worst (40)scenario, (41)the (42)performance (43)impact (44)on (45)the (46)generated (47)variants (48)is (49)maintained (50)within (51)the (52)same (53)order (54)of (55)magnitude (56)as (57)the (58)original (59)program. Remarkably, (60)our (61)experiments (62)provide (63)evidence (64)that (65)the (66)generated (67)variants (68)are (69)hardened (70)against (71)Spectre (72)attacks. To (73)sum (74)up, (75)the (76)contributions (77)of (78)this (79)work (80)are:
(0)Our (1)results (2)demonstrate (3)that (4)WASM-MUTATE (5)can (6)gen-erate (7)thousands (8)of (9)variants (10)in (11)minutes. These (12)variants (13)have (14)unique (15)machine (16)code (17)after (18)compilation (19)with (20)Cranelift! (21)(static (22)diversity) (23)and (24)the (25)variants (26)exhibit (27)different (28)traces (29)at (30)runtime (31)(dynamic (32)diversity). Moreover, (33)we (34)empirically (35)demonstrate (36)that, (37)in (38)the (39)worst (40)scenario, (41)the (42)performance (43)impact (44)on (45)the (46)generated (47)variants (48)is (49)maintained (50)within (51)the (52)same (53)order (54)of (55)magnitude (56)as (57)the (58)original (59)program. (60)Remarkably, (61)our (62)experiments (63)provide (64)evidence (65)that (66)the (67)generated (68)variants (69)are (70)hardened (71)against (72)Spectre (73)attacks. To (74)sum (75)up, (76)the (77)contributions (78)of (79)this (80)work (81)are:
insert '' by 'Background'
(0)2. Background (1)Background (2)Background (3)Background (4)Background (5)Background (6)Background (7)Background (8)Background (9)Background (10)Background (11)Background (12)Background (13)Background (14)Background (15)Background (16)Background (17)Background (18)Background (19)Background (20)Background (21)Background (22)Background (23)Background (24)Background (25)Background (26)Background (27)Background (28)Background (29)Background (30)Background (31)Background (32)Background (33)Background (34)Background (35)Background (36)Background (37)Background (38)Background (39)Background (40)Background (41)Background (42)Background (43)Background (44)Background (45)Background (46)Background (47)Background (48)Background (49)Background (50)Background (51)Background (52)Background (53)Background (54)Background (55)Background (56)Background (57)Background (58)Background (59)Background (60)Background (61)Background (62)Background (63)Background (64)Background (65)Background (66)Background (67)Background (68)Background (69)Background (70)Background (71)Background (72)Background (73)Background (74)Background (75)Background (76)Background (77)Background (78)Background (79)Background (80)Background (81)Background (82)Background (83)Background (84)Background (85)Background (86)Background (87)Background (88)Background (89)Background (90)Background (91)Background (92)Background (93)Background (94)Background (95)Background (96)Background (97)Background (98)Background (99)Background (100)Background (101)Background (102)Background (103)Background (104)Background (105)Background (106)Background (107)Background (108)Background (109)Background (110)Background (111)Background (112)Background
(0)2. Background
7
replace '7' by '7,'
(0)This (1)paper (2)is (3)structured (4)as (5)follows. In (6)section (7)2, (8)we (9)introduce (10)WebAssembly, (11)the (12)concepts (13)of (14)semantic (15)equivalence, (16)and (17)what (18)we (19)state (20)as (21)a (22)rewriting (23)rule. In (24)section (25)3, (26)we (27)explain (28)and (29)detail (30)the (31)architecture (32)and (33)implementation (34)of (35)WASM-MUTATE. We (36)formulate (37)our (38)research (39)questions (40)in (41)section (42)4, (43)answering (44)them (45)in (46)section (47)5. We (48)discuss (49)open (50)challenges (51)related (52)to (53)our (54)research (55)in (56)section (57)6, (58)to (59)help (60)future (61)research (62)projects (63)on (64)similar (65)topics. In (66)section (67)7, (68)we (69)highlight (70)works (71)related (72)to (73)our (74)research (75)on (76)software (77)diversification. We (78)finalize (79)with (80)our (81)conclusions (82)section (83)8.
(0)This (1)paper (2)is (3)structured (4)as (5)follows. In (6)section (7)2, (8)we (9)introduce (10)WebAssembly, (11)the (12)concepts (13)of (14)semantic (15)equivalence, (16)and (17)what (18)we (19)state (20)as (21)a (22)rewriting (23)rule. In (24)section (25)3, (26)we (27)explain (28)and (29)detail (30)the (31)architecture (32)and (33)implementation (34)of (35)WASM-MUTATE. We (36)formulate (37)our (38)research (39)questions (40)in (41)section (42)4, (43)answering (44)them (45)in (46)section (47)5. (48)We (49)discuss (50)open (51)challenges (52)related (53)to (54)our (55)research (56)in (57)section (58)6, (59)to (60)help (61)future (62)research (63)projects (64)on (65)similar (66)topics. (67)In (68)section (69)7 (70)we (71)highlight (72)works (73)related (74)to (75)our (76)research (77)on (78)software (79)diversification. We (80)finalize (81)with (82)our (83)conclusions (84)section (85)8.
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)2 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)2 (5)of (6)25
$main))
delete '$main))' by ''
(0)Listing (1)2: (2)Simplified (3)WebAssembly (4)code (5)for (6)the (7)program (8)of (9)Listing (10)1.
(0)(start (1)$main)) (2)Listing (3)2: (4)Simplified (5)WebAssembly (6)code (7)for (8)the (9)program (10)of (11)Listing (12)1.
(start
delete '(start' by ''
(0)Listing (1)2: (2)Simplified (3)WebAssembly (4)code (5)for (6)the (7)program (8)of (9)Listing (10)1.
(0)(start (1)$main)) (2)Listing (3)2: (4)Simplified (5)WebAssembly (6)code (7)for (8)the (9)program (10)of (11)Listing (12)1.
insert '' by '$sum'
(0)Local.get (1)$sum (2)call (3)$printlin.get (4)$sum (5)call (6)$printlin.get (7)$sum (8)call (9)$printlin.get (10)$sum (11)call (12)$printlin.get (13)$sum (14)call (15)$printlin.get (16)$sum (17)call (18)$printlin.get (19)$sum (20)call (21)$printlin.get (22)$sum (23)call (24)$printlin.get (25)$sum (26)call (27)$printlin.get (28)$sum (29)call (30)$printlin.get (31)$sum (32)call (33)$printlin.get (34)$sum (35)call (36)$printlin.get (37)$sum
(0)local.get (1)$sum (2)call (3)$printlin
$printlin
replace '$printlin' by '$printlin.get'
(0)Local.get (1)$sum (2)call (3)$printlin.get (4)$sum (5)call (6)$printlin.get (7)$sum (8)call (9)$printlin.get (10)$sum (11)call (12)$printlin.get (13)$sum (14)call (15)$printlin.get (16)$sum (17)call (18)$printlin.get (19)$sum (20)call (21)$printlin.get (22)$sum (23)call (24)$printlin.get (25)$sum (26)call (27)$printlin.get (28)$sum (29)call (30)$printlin.get (31)$sum (32)call (33)$printlin.get (34)$sum (35)call (36)$printlin.get (37)$sum
(0)local.get (1)$sum (2)call (3)$printlin
insert '' by '$printlin.get'
(0)Local.get (1)$sum (2)call (3)$printlin.get (4)$sum (5)call (6)$printlin.get (7)$sum (8)call (9)$printlin.get (10)$sum (11)call (12)$printlin.get (13)$sum (14)call (15)$printlin.get (16)$sum (17)call (18)$printlin.get (19)$sum (20)call (21)$printlin.get (22)$sum (23)call (24)$printlin.get (25)$sum (26)call (27)$printlin.get (28)$sum (29)call (30)$printlin.get (31)$sum (32)call (33)$printlin.get (34)$sum (35)call (36)$printlin.get (37)$sum
(0)local.get (1)$sum (2)call (3)$printlin
insert '' by 'call'
(0)Local.get (1)$sum (2)call (3)$printlin.get (4)$sum (5)call (6)$printlin.get (7)$sum (8)call (9)$printlin.get (10)$sum (11)call (12)$printlin.get (13)$sum (14)call (15)$printlin.get (16)$sum (17)call (18)$printlin.get (19)$sum (20)call (21)$printlin.get (22)$sum (23)call (24)$printlin.get (25)$sum (26)call (27)$printlin.get (28)$sum (29)call (30)$printlin.get (31)$sum (32)call (33)$printlin.get (34)$sum (35)call (36)$printlin.get (37)$sum
(0)local.get (1)$sum (2)call (3)$printlin
local.get
replace 'local.get' by 'Local.get'
(0)Local.get (1)$sum (2)call (3)$printlin.get (4)$sum (5)call (6)$printlin.get (7)$sum (8)call (9)$printlin.get (10)$sum (11)call (12)$printlin.get (13)$sum (14)call (15)$printlin.get (16)$sum (17)call (18)$printlin.get (19)$sum (20)call (21)$printlin.get (22)$sum (23)call (24)$printlin.get (25)$sum (26)call (27)$printlin.get (28)$sum (29)call (30)$printlin.get (31)$sum (32)call (33)$printlin.get (34)$sum (35)call (36)$printlin.get (37)$sum
(0)local.get (1)$sum (2)call (3)$printlin
tuple,
replace 'tuple,' by 'triple,'
(0)Our (1)definition (2)of (3)a (4)rewriting (5)rule (6)draws (7)from (8)the (9)one (10)proposed (11)by (12)Sasnauskas (13)et (14)al. [43], (15)and (16)integrates (17)a (18)predicate (19)to (20)specify (21)the (22)replacement (23)condition. Concretely, (24)a (25)rewriting (26)rule (27)is (28)defined (29)as (30)a (31)triple, (32)denoted (33)as (34)(LHs, (35)RHS, (36)Cond). Here, (37)tus (38)refers (39)to (40)the (41)code (42)segment (43)slated (44)for (45)replacement, (46)RHs (47)is (48)the (49)proposed (50)replacement, (51)and (52)cond (53)stipulates (54)the (55)conditions (56)under (57)which (58)the (59)replacement (60)is (61)acceptable. Importantly, (62)LHs (63)and (64)rHs (65)are (66)meant (67)to (68)be (69)functionally (70)equivalent.
(0)Our (1)definition (2)of (3)a (4)rewriting (5)rule (6)draws (7)from (8)the (9)one (10)proposed (11)by (12)Sasnauskas (13)et (14)al. [43], (15)and (16)integrates (17)a (18)predicate (19)to (20)specify (21)the (22)replacement (23)condition. Concretely, (24)a (25)rewriting (26)rule (27)is (28)defined (29)as (30)a (31)tuple, (32)denoted (33)as (34)(LHs, (35)RHS, (36)Cond). Here, (37)tus (38)refers (39)to (40)the (41)code (42)segment (43)slated (44)for (45)replacement, (46)RHs (47)is (48)the (49)proposed (50)replacement, (51)and (52)cond (53)stipulates (54)the (55)conditions (56)under (57)which (58)the (59)replacement (60)is (61)acceptable. Importantly, (62)LHs (63)and (64)rHs (65)are (66)meant (67)to (68)be (69)functionally (70)equivalent.
rules
replace 'rules' by 'rules.'
(0)2.2. Rewriting (1)rules.
(0)2.2. Rewriting (1)rules
end
replace 'end' by 'end.'
(0)i32.const (1)@ (2)end (3)end.
(0)i32.const (1)@ (2)end (3)end
i32
This sentence does not start with an uppercase letter.
i32.const @ end end
else
replace 'else' by 'else.'
(0)Local.get (1)$i (2)i32.const (3)1 (4)i32.add (5)local.set (6)$i (7)br (8)@ (9)else.
(0)local.get (1)$i (2)i32.const (3)1 (4)i32.add (5)local.set (6)$i (7)br (8)@ (9)else
local.get
replace 'local.get' by 'Local.get'
(0)Local.get (1)$i (2)i32.const (3)1 (4)i32.add (5)local.set (6)$i (7)br (8)@ (9)else.
(0)local.get (1)$i (2)i32.const (3)1 (4)i32.add (5)local.set (6)$i (7)br (8)@ (9)else
local
This sentence does not start with an uppercase letter.
local.get $i i32.const 1 i32.add local.set $i br @ else
$arr_offset
replace '$arr_offset' by '$ir_offset'
(0)Local.get (1)$arr_offset (2)local.get (3)$ir_offset (4)local.get (5)$ir_offset (6)local.get (7)$ir_offset (8)local.get (9)$ir_offset (10)local.get (11)$ir_offset (12)local.get (13)$ir_offset (14)local.get (15)$ir_offset (16)local.get (17)$ir_offset (18)local.get (19)$ir_offset (20)local.get (21)$ir_offset (22)local.get (23)$ir_offset (24)local.get (25)$i
(0)local.get (1)$arr_offset (2)local.get (3)$i
insert '' by '$ir_offset'
(0)Local.get (1)$arr_offset (2)local.get (3)$ir_offset (4)local.get (5)$ir_offset (6)local.get (7)$ir_offset (8)local.get (9)$ir_offset (10)local.get (11)$ir_offset (12)local.get (13)$ir_offset (14)local.get (15)$ir_offset (16)local.get (17)$ir_offset (18)local.get (19)$ir_offset (20)local.get (21)$ir_offset (22)local.get (23)$ir_offset (24)local.get (25)$i
(0)local.get (1)$arr_offset (2)local.get (3)$i
insert '' by 'local.get'
(0)Local.get (1)$arr_offset (2)local.get (3)$ir_offset (4)local.get (5)$ir_offset (6)local.get (7)$ir_offset (8)local.get (9)$ir_offset (10)local.get (11)$ir_offset (12)local.get (13)$ir_offset (14)local.get (15)$ir_offset (16)local.get (17)$ir_offset (18)local.get (19)$ir_offset (20)local.get (21)$ir_offset (22)local.get (23)$ir_offset (24)local.get (25)$i
(0)local.get (1)$arr_offset (2)local.get (3)$i
insert '' by '$arr_offset'
(0)Local.get (1)$arr_offset (2)local.get (3)$ir_offset (4)local.get (5)$ir_offset (6)local.get (7)$ir_offset (8)local.get (9)$ir_offset (10)local.get (11)$ir_offset (12)local.get (13)$ir_offset (14)local.get (15)$ir_offset (16)local.get (17)$ir_offset (18)local.get (19)$ir_offset (20)local.get (21)$ir_offset (22)local.get (23)$ir_offset (24)local.get (25)$i
(0)local.get (1)$arr_offset (2)local.get (3)$i
insert '' by 'Local.get'
(0)Local.get (1)$arr_offset (2)local.get (3)$ir_offset (4)local.get (5)$ir_offset (6)local.get (7)$ir_offset (8)local.get (9)$ir_offset (10)local.get (11)$ir_offset (12)local.get (13)$ir_offset (14)local.get (15)$ir_offset (16)local.get (17)$ir_offset (18)local.get (19)$ir_offset (20)local.get (21)$ir_offset (22)local.get (23)$ir_offset (24)local.get (25)$i
(0)local.get (1)$arr_offset (2)local.get (3)$i
local
This sentence does not start with an uppercase letter.
local.get $arr_offset local.get $i
if
delete 'if' by ''
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
132.1t_s
replace '132.1t_s' by 'not.'
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
5
replace '5' by 'if'
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
i32.const
replace 'i32.const' by '132.1t_s'
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
$i
replace '$i' by '5'
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
local.get
replace 'local.get' by 'i32.const'
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
loop
replace 'loop' by '$i'
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
i32.store
replace 'i32.store' by 'local.get'
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
132.store
replace '132.store' by 'loop'
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
1
replace '1' by 'i32.store'
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
i32.const
replace 'i32.const' by '132.store'
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
@
replace '@' by '1'
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
insert '' by '@'
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
insert '' by 'i32.const'
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if (13)not.
(0)i32.const (1)@ (2)i32.const (3)1 (4)132.store (5)i32.store (6)loop (7)local.get (8)$i (9)i32.const (10)5 (11)132.1t_s (12)if
i32
This sentence does not start with an uppercase letter.
i32.const @ i32.const 1 132.store i32.store loop local.get $i i32.const 5 132.1t_s if
insert '' by '$'
(0)i32.const (1)@ (2)local.set (3)$arr_offset (4)$arr_offset (5)$arr_offset (6)$arr_offset (7)$arr_offset (8)$arr_offset (9)$arr_offset (10)$arr_offset (11)$arr_offset (12)$arr_offset (13)$arr_offset (14)$arr_offset (15)$arr_offset (16)$arr_offset (17)$arr_offset (18)$arr_offset (19)$arr_offset (20)$
(0)i32.const (1)@ (2)local.set (3)$arr_offset
insert '' by '$arr_offset'
(0)i32.const (1)@ (2)local.set (3)$arr_offset (4)$arr_offset (5)$arr_offset (6)$arr_offset (7)$arr_offset (8)$arr_offset (9)$arr_offset (10)$arr_offset (11)$arr_offset (12)$arr_offset (13)$arr_offset (14)$arr_offset (15)$arr_offset (16)$arr_offset (17)$arr_offset (18)$arr_offset (19)$arr_offset (20)$
(0)i32.const (1)@ (2)local.set (3)$arr_offset
i32
This sentence does not start with an uppercase letter.
i32.const @ local.set $arr_offset
$sum
replace '$sum' by '$sum.'
(0)i32.const (1)@ (2)local.set (3)$sum.
(0)i32.const (1)@ (2)local.set (3)$sum
i32
This sentence does not start with an uppercase letter.
i32.const @ local.set $sum
i32)
replace 'i32)' by 'i32))'
(0)(module (1)(@custom (2)“producer” (3)"llvm..”) (4)(import (5)"env” (6)"println” (7)(func (8)$println (9)(param (10)i32))) (11)(memory (12)1) (13)(export (14)“memory” (15)(memory (16)Q)) (17)(func (18)$main (19)(local (20)$sum (21)i32) (22)(local (23)$i (24)132) (25)(local (26)$arr_offset (27)i32))
(0)(module (1)(@custom (2)“producer” (3)"llvm..”) (4)(import (5)"env” (6)"println” (7)(func (8)$println (9)(param (10)i32))) (11)(memory (12)1) (13)(export (14)“memory” (15)(memory (16)Q)) (17)(func (18)$main (19)(local (20)$sum (21)i32) (22)(local (23)$i (24)132) (25)(local (26)$arr_offset (27)i32)
(
Unpaired symbol: ‘)’ seems to be missing
(module (@custom “producer” "llvm..”) (import "env” "println” (func $println (param i32))) (memory 1) (export “memory” (memory Q)) (func $main (local $sum i32) (local $i 132) (local $arr_offset i32)
sum);}
replace 'sum);}' by 'sum);'
(0)Printin! (1)("Sum (2)of (3)array (4)elements: (5)", (6)sum); (7)Listing (8)1: (9)A (10)Rust (11)program (12)containing (13)function (14)declaration, (15)loop, (16)conditional (17)and (18)memory (19)access.
(0)printin! (1)("Sum (2)of (3)array (4)elements: (5){}", (6)sum);} (7)Listing (8)1: (9)A (10)Rust (11)program (12)containing (13)function (14)declaration, (15)loop, (16)conditional (17)and (18)memory (19)access.
{}",
replace '{}",' by '",'
(0)Printin! (1)("Sum (2)of (3)array (4)elements: (5)", (6)sum); (7)Listing (8)1: (9)A (10)Rust (11)program (12)containing (13)function (14)declaration, (15)loop, (16)conditional (17)and (18)memory (19)access.
(0)printin! (1)("Sum (2)of (3)array (4)elements: (5){}", (6)sum);} (7)Listing (8)1: (9)A (10)Rust (11)program (12)containing (13)function (14)declaration, (15)loop, (16)conditional (17)and (18)memory (19)access.
printin!
replace 'printin!' by 'Printin!'
(0)Printin! (1)("Sum (2)of (3)array (4)elements: (5)", (6)sum); (7)Listing (8)1: (9)A (10)Rust (11)program (12)containing (13)function (14)declaration, (15)loop, (16)conditional (17)and (18)memory (19)access.
(0)printin! (1)("Sum (2)of (3)array (4)elements: (5){}", (6)sum);} (7)Listing (8)1: (9)A (10)Rust (11)program (12)containing (13)function (14)declaration, (15)loop, (16)conditional (17)and (18)memory (19)access.
printin
This sentence does not start with an uppercase letter.
printin! ("Sum of array elements: {}", sum);} Listing 1: A Rust program containing function declaration, loop, conditional and memory access.
{
delete '{' by ''
(0)For (1)i (2)in (3)Q..arr.len() (4) (5)sum (6)+= (7)arr[il];
(0)for (1)i (2)in (3)Q..arr.len() (4){ (5)sum (6)+= (7)arr[il];
for
replace 'for' by 'For'
(0)For (1)i (2)in (3)Q..arr.len() (4) (5)sum (6)+= (7)arr[il];
(0)for (1)i (2)in (3)Q..arr.len() (4){ (5)sum (6)+= (7)arr[il];
Q;
replace 'Q;' by 'Q.'
(0)Let (1)mut (2)sum (3)= (4)Q.
(0)let (1)mut (2)sum (3)= (4)Q;
let
replace 'let' by 'Let'
(0)Let (1)mut (2)sum (3)= (4)Q.
(0)let (1)mut (2)sum (3)= (4)Q;
constrained
replace 'constrained' by 'restricted'
(0)WebAssembly (1)is (2)designed (3)with (4)isolation (5)as (6)a (7)primary (8)consideration, (9)usually (10)referred (11)to (12)as (13)Software (14)Fault (15)Isolation (16)(SFD). For (17)instance, (18)a (19)WebAssembly (20)binary (21)cannot (22)access (23)the (24)memory (25)of (26)other (27)binaries (28)or (29)cannot (30)interact (31)directly (32)with (33)the (34)browser’s (35)APIs, (36)such (37)as (38)the (39)DOM (40)or (41)the (42)network. Instead, (43)communication (44)with (45)these (46)features (47)is (48)restricted (49)to (50)functions (51)imported (52)from (53)the (54)host (55)engine, (56)ensuring (57)a (58)secure (59)and (60)safe (61)WebAssembly (62)environment. Moreover, (63)control (64)flow (65)in (66)WebAssembly (67)is (68)managed (69)through (70)explicit (71)labels (72)and (73)well-defined (74)blocks, (75)which (76)means (77)that (78)jumps (79)in (80)the (81)program (82)can (83)only (84)occur (85)inside (86)blocks, (87)unlike (88)regular (89)assembly (90)code (91)[24]. Besides, (92)function (93)tables (94)are (95)constructed (96)statically. Overall, (97)the (98)"least (99)privilege" (100)principle (101)is (102)the (103)fundamental (104)security (105)requirement. This (106)principle (107)is (108)reflected (109)in (110)the (111)lack (112)of (113)certain (114)features (115)that (116)are (117)common (118)in (119)other (120)programming (121)environments. For (122)example, (123)reflection, (124)a (125)feature (126)available (127)in (128)many (129)high-level (130)programming (131)languages (132)like (133)Java (134)and (135)C#, (136)is (137)not (138)possible (139)in (140)WebAssembly.
(0)WebAssembly (1)is (2)designed (3)with (4)isolation (5)as (6)a (7)primary (8)consideration, (9)usually (10)referred (11)as (12)Software (13)Fault (14)Isolation (15)(SFD. For (16)instance, (17)a (18)WebAssembly (19)binary (20)cannot (21)access (22)the (23)memory (24)of (25)other (26)binaries (27)or (28)cannot (29)interact (30)directly (31)with (32)the (33)browser’s (34)APIs, (35)such (36)as (37)the (38)DOM (39)or (40)the (41)network. (42)Instead, (43)communication (44)with (45)these (46)features (47)is (48)constrained (49)to (50)functions (51)imported (52)from (53)the (54)host (55)engine, (56)ensuring (57)a (58)secure (59)and (60)safe (61)WebAssembly (62)environment. Moreover, (63)control (64)flow (65)in (66)WebAssembly (67)is (68)managed (69)through (70)explicit (71)labels (72)and (73)well-defined (74)blocks, (75)which (76)means (77)that (78)jumps (79)in (80)the (81)program (82)can (83)only (84)occur (85)inside (86)blocks, (87)unlike (88)regular (89)assembly (90)code (91)[24]. Besides, (92)function (93)tables (94)are (95)constructed (96)statically. (97)Overall, (98)the (99)"least (100)privilege" (101)principle (102)is (103)the (104)fundamental (105)security (106)requirement. This (107)principle (108)is (109)reflected (110)in (111)the (112)lack (113)of (114)certain (115)features (116)that (117)are (118)common (119)in (120)other (121)programming (122)environments. For (123)example, (124)reflection, (125)a (126)feature (127)available (128)in (129)many (130)high-level (131)programming (132)languages (133)like (134)Java (135)and (136)C#, (137)is (138)not (139)possible (140)in (141)WebAssembly.
(SFD.
replace '(SFD.' by '(SFD).'
(0)WebAssembly (1)is (2)designed (3)with (4)isolation (5)as (6)a (7)primary (8)consideration, (9)usually (10)referred (11)to (12)as (13)Software (14)Fault (15)Isolation (16)(SFD). For (17)instance, (18)a (19)WebAssembly (20)binary (21)cannot (22)access (23)the (24)memory (25)of (26)other (27)binaries (28)or (29)cannot (30)interact (31)directly (32)with (33)the (34)browser’s (35)APIs, (36)such (37)as (38)the (39)DOM (40)or (41)the (42)network. Instead, (43)communication (44)with (45)these (46)features (47)is (48)restricted (49)to (50)functions (51)imported (52)from (53)the (54)host (55)engine, (56)ensuring (57)a (58)secure (59)and (60)safe (61)WebAssembly (62)environment. Moreover, (63)control (64)flow (65)in (66)WebAssembly (67)is (68)managed (69)through (70)explicit (71)labels (72)and (73)well-defined (74)blocks, (75)which (76)means (77)that (78)jumps (79)in (80)the (81)program (82)can (83)only (84)occur (85)inside (86)blocks, (87)unlike (88)regular (89)assembly (90)code (91)[24]. Besides, (92)function (93)tables (94)are (95)constructed (96)statically. Overall, (97)the (98)"least (99)privilege" (100)principle (101)is (102)the (103)fundamental (104)security (105)requirement. This (106)principle (107)is (108)reflected (109)in (110)the (111)lack (112)of (113)certain (114)features (115)that (116)are (117)common (118)in (119)other (120)programming (121)environments. For (122)example, (123)reflection, (124)a (125)feature (126)available (127)in (128)many (129)high-level (130)programming (131)languages (132)like (133)Java (134)and (135)C#, (136)is (137)not (138)possible (139)in (140)WebAssembly.
(0)WebAssembly (1)is (2)designed (3)with (4)isolation (5)as (6)a (7)primary (8)consideration, (9)usually (10)referred (11)as (12)Software (13)Fault (14)Isolation (15)(SFD. For (16)instance, (17)a (18)WebAssembly (19)binary (20)cannot (21)access (22)the (23)memory (24)of (25)other (26)binaries (27)or (28)cannot (29)interact (30)directly (31)with (32)the (33)browser’s (34)APIs, (35)such (36)as (37)the (38)DOM (39)or (40)the (41)network. (42)Instead, (43)communication (44)with (45)these (46)features (47)is (48)constrained (49)to (50)functions (51)imported (52)from (53)the (54)host (55)engine, (56)ensuring (57)a (58)secure (59)and (60)safe (61)WebAssembly (62)environment. Moreover, (63)control (64)flow (65)in (66)WebAssembly (67)is (68)managed (69)through (70)explicit (71)labels (72)and (73)well-defined (74)blocks, (75)which (76)means (77)that (78)jumps (79)in (80)the (81)program (82)can (83)only (84)occur (85)inside (86)blocks, (87)unlike (88)regular (89)assembly (90)code (91)[24]. Besides, (92)function (93)tables (94)are (95)constructed (96)statically. (97)Overall, (98)the (99)"least (100)privilege" (101)principle (102)is (103)the (104)fundamental (105)security (106)requirement. This (107)principle (108)is (109)reflected (110)in (111)the (112)lack (113)of (114)certain (115)features (116)that (117)are (118)common (119)in (120)other (121)programming (122)environments. For (123)example, (124)reflection, (125)a (126)feature (127)available (128)in (129)many (130)high-level (131)programming (132)languages (133)like (134)Java (135)and (136)C#, (137)is (138)not (139)possible (140)in (141)WebAssembly.
insert '' by 'to'
(0)WebAssembly (1)is (2)designed (3)with (4)isolation (5)as (6)a (7)primary (8)consideration, (9)usually (10)referred (11)to (12)as (13)Software (14)Fault (15)Isolation (16)(SFD). For (17)instance, (18)a (19)WebAssembly (20)binary (21)cannot (22)access (23)the (24)memory (25)of (26)other (27)binaries (28)or (29)cannot (30)interact (31)directly (32)with (33)the (34)browser’s (35)APIs, (36)such (37)as (38)the (39)DOM (40)or (41)the (42)network. Instead, (43)communication (44)with (45)these (46)features (47)is (48)restricted (49)to (50)functions (51)imported (52)from (53)the (54)host (55)engine, (56)ensuring (57)a (58)secure (59)and (60)safe (61)WebAssembly (62)environment. Moreover, (63)control (64)flow (65)in (66)WebAssembly (67)is (68)managed (69)through (70)explicit (71)labels (72)and (73)well-defined (74)blocks, (75)which (76)means (77)that (78)jumps (79)in (80)the (81)program (82)can (83)only (84)occur (85)inside (86)blocks, (87)unlike (88)regular (89)assembly (90)code (91)[24]. Besides, (92)function (93)tables (94)are (95)constructed (96)statically. Overall, (97)the (98)"least (99)privilege" (100)principle (101)is (102)the (103)fundamental (104)security (105)requirement. This (106)principle (107)is (108)reflected (109)in (110)the (111)lack (112)of (113)certain (114)features (115)that (116)are (117)common (118)in (119)other (120)programming (121)environments. For (122)example, (123)reflection, (124)a (125)feature (126)available (127)in (128)many (129)high-level (130)programming (131)languages (132)like (133)Java (134)and (135)C#, (136)is (137)not (138)possible (139)in (140)WebAssembly.
(0)WebAssembly (1)is (2)designed (3)with (4)isolation (5)as (6)a (7)primary (8)consideration, (9)usually (10)referred (11)as (12)Software (13)Fault (14)Isolation (15)(SFD. For (16)instance, (17)a (18)WebAssembly (19)binary (20)cannot (21)access (22)the (23)memory (24)of (25)other (26)binaries (27)or (28)cannot (29)interact (30)directly (31)with (32)the (33)browser’s (34)APIs, (35)such (36)as (37)the (38)DOM (39)or (40)the (41)network. (42)Instead, (43)communication (44)with (45)these (46)features (47)is (48)constrained (49)to (50)functions (51)imported (52)from (53)the (54)host (55)engine, (56)ensuring (57)a (58)secure (59)and (60)safe (61)WebAssembly (62)environment. Moreover, (63)control (64)flow (65)in (66)WebAssembly (67)is (68)managed (69)through (70)explicit (71)labels (72)and (73)well-defined (74)blocks, (75)which (76)means (77)that (78)jumps (79)in (80)the (81)program (82)can (83)only (84)occur (85)inside (86)blocks, (87)unlike (88)regular (89)assembly (90)code (91)[24]. Besides, (92)function (93)tables (94)are (95)constructed (96)statically. (97)Overall, (98)the (99)"least (100)privilege" (101)principle (102)is (103)the (104)fundamental (105)security (106)requirement. This (107)principle (108)is (109)reflected (110)in (111)the (112)lack (113)of (114)certain (115)features (116)that (117)are (118)common (119)in (120)other (121)programming (122)environments. For (123)example, (124)reflection, (125)a (126)feature (127)available (128)in (129)many (130)high-level (131)programming (132)languages (133)like (134)Java (135)and (136)C#, (137)is (138)not (139)possible (140)in (141)WebAssembly.
(
Unpaired symbol: ‘)’ seems to be missing
WebAssembly is designed with isolation as a primary consideration, usually referred as Software Fault Isolation (SFD. For instance, a WebAssembly binary cannot access the memory of other binaries or cannot interact directly with the browser’s APIs, such as the DOM or the network. Instead, communication with these features is constrained to functions imported from the host engine, ensuring a secure and safe WebAssembly environment. Moreover, control flow in WebAssembly is managed through explicit labels and well-defined blocks, which means that jumps in the program can only occur inside blocks, unlike regular assembly code [24]. Besides, function tables are constructed statically. Overall, the "least privilege" principle is the fundamental security requirement. This principle is reflected in the lack of certain features that are common in other programming environments. For example, reflection, a feature available in many high-level programming languages like Java and C#, is not possible in WebAssembly.
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)3 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)3 (5)of (6)25
WASM-MUTATE
replace 'WASM-MUTATE' by 'WASM-MUTATE.'
(0)3. Design (1)of (2)WASM-MUTATE.
(0)3. Design (1)of (2)WASM-MUTATE
cond
replace 'cond' by 'condition'
(0)For (1)example, (2)the (3)rewriting (4)rule (5)(x, (6)x (7)i32.or (8)x, (9)) (10)implies (11)that (12)the (13)Lys (14)’x’ (15)is (16)to (17)be (18)replaced (19)by (20)an (21)idempotent (22)bitwise (23)i32.or (24)operation (25)with (26)itself, (27)absent (28)any (29)specific (30)conditions. Notice (31)that, (32)for (33)this (34)specific (35)rule, (36)the (37)commutative (38)property (39)shared (40)by (41)Lus (42)and (43)rus, (44)symbolized (45)as (46)(LHS, (47)RHS)= (48)(RHS, (49)LHS). Besides, (50)the (51)condition (52)element (53)could (54)be (55)an (56)arbitrary (57)criterion. For (58)instance, (59)the (60)condition (61)for (62)applying (63)the (64)aforementioned (65)rewriting (66)rule (67)could (68)be (69)to (70)ensure (71)that (72)the (73)newly (74)created (75)binary (76)file (77)does (78)not (79)exceed (80)a (81)threshold (82)binary (83)size.
(0)For (1)example, (2)the (3)rewriting (4)rule (5)(x, (6)x (7)i32.or (8)x, (9){}) (10)implies (11)that (12)the (13)Lys (14)’x’ (15)is (16)to (17)be (18)replaced (19)by (20)an (21)idempotent (22)bitwise (23)i32.or (24)operation (25)with (26)itself, (27)absent (28)any (29)specific (30)con-ditions. Notice (31)that, (32)for (33)this (34)specific (35)rule, (36)the (37)commutative (38)property (39)shared (40)by (41)Lus (42)and (43)rus, (44)symbolized (45)as (46)(LHS, (47)RHS)= (48)(RHS, (49)LHS). Besides, (50)the (51)cond (52)element (53)could (54)be (55)an (56)arbitrary (57)criterion. For (58)instance, (59)the (60)condition (61)for (62)applying (63)the (64)aforementioned (65)rewriting (66)rule (67)could (68)be (69)to (70)ensure (71)that (72)the (73)newly (74)created (75)binary (76)file (77)does (78)not (79)exceed (80)a (81)threshold (82)binary (83)size.
con-ditions.
replace 'con-ditions.' by 'conditions.'
(0)For (1)example, (2)the (3)rewriting (4)rule (5)(x, (6)x (7)i32.or (8)x, (9)) (10)implies (11)that (12)the (13)Lys (14)’x’ (15)is (16)to (17)be (18)replaced (19)by (20)an (21)idempotent (22)bitwise (23)i32.or (24)operation (25)with (26)itself, (27)absent (28)any (29)specific (30)conditions. Notice (31)that, (32)for (33)this (34)specific (35)rule, (36)the (37)commutative (38)property (39)shared (40)by (41)Lus (42)and (43)rus, (44)symbolized (45)as (46)(LHS, (47)RHS)= (48)(RHS, (49)LHS). Besides, (50)the (51)condition (52)element (53)could (54)be (55)an (56)arbitrary (57)criterion. For (58)instance, (59)the (60)condition (61)for (62)applying (63)the (64)aforementioned (65)rewriting (66)rule (67)could (68)be (69)to (70)ensure (71)that (72)the (73)newly (74)created (75)binary (76)file (77)does (78)not (79)exceed (80)a (81)threshold (82)binary (83)size.
(0)For (1)example, (2)the (3)rewriting (4)rule (5)(x, (6)x (7)i32.or (8)x, (9){}) (10)implies (11)that (12)the (13)Lys (14)’x’ (15)is (16)to (17)be (18)replaced (19)by (20)an (21)idempotent (22)bitwise (23)i32.or (24)operation (25)with (26)itself, (27)absent (28)any (29)specific (30)con-ditions. Notice (31)that, (32)for (33)this (34)specific (35)rule, (36)the (37)commutative (38)property (39)shared (40)by (41)Lus (42)and (43)rus, (44)symbolized (45)as (46)(LHS, (47)RHS)= (48)(RHS, (49)LHS). Besides, (50)the (51)cond (52)element (53)could (54)be (55)an (56)arbitrary (57)criterion. For (58)instance, (59)the (60)condition (61)for (62)applying (63)the (64)aforementioned (65)rewriting (66)rule (67)could (68)be (69)to (70)ensure (71)that (72)the (73)newly (74)created (75)binary (76)file (77)does (78)not (79)exceed (80)a (81)threshold (82)binary (83)size.
{})
replace '{})' by ')'
(0)For (1)example, (2)the (3)rewriting (4)rule (5)(x, (6)x (7)i32.or (8)x, (9)) (10)implies (11)that (12)the (13)Lys (14)’x’ (15)is (16)to (17)be (18)replaced (19)by (20)an (21)idempotent (22)bitwise (23)i32.or (24)operation (25)with (26)itself, (27)absent (28)any (29)specific (30)conditions. Notice (31)that, (32)for (33)this (34)specific (35)rule, (36)the (37)commutative (38)property (39)shared (40)by (41)Lus (42)and (43)rus, (44)symbolized (45)as (46)(LHS, (47)RHS)= (48)(RHS, (49)LHS). Besides, (50)the (51)condition (52)element (53)could (54)be (55)an (56)arbitrary (57)criterion. For (58)instance, (59)the (60)condition (61)for (62)applying (63)the (64)aforementioned (65)rewriting (66)rule (67)could (68)be (69)to (70)ensure (71)that (72)the (73)newly (74)created (75)binary (76)file (77)does (78)not (79)exceed (80)a (81)threshold (82)binary (83)size.
(0)For (1)example, (2)the (3)rewriting (4)rule (5)(x, (6)x (7)i32.or (8)x, (9){}) (10)implies (11)that (12)the (13)Lys (14)’x’ (15)is (16)to (17)be (18)replaced (19)by (20)an (21)idempotent (22)bitwise (23)i32.or (24)operation (25)with (26)itself, (27)absent (28)any (29)specific (30)con-ditions. Notice (31)that, (32)for (33)this (34)specific (35)rule, (36)the (37)commutative (38)property (39)shared (40)by (41)Lus (42)and (43)rus, (44)symbolized (45)as (46)(LHS, (47)RHS)= (48)(RHS, (49)LHS). Besides, (50)the (51)cond (52)element (53)could (54)be (55)an (56)arbitrary (57)criterion. For (58)instance, (59)the (60)condition (61)for (62)applying (63)the (64)aforementioned (65)rewriting (66)rule (67)could (68)be (69)to (70)ensure (71)that (72)the (73)newly (74)created (75)binary (76)file (77)does (78)not (79)exceed (80)a (81)threshold (82)binary (83)size.
’
Unpaired symbol: ‘‘’ seems to be missing
For example, the rewriting rule (x, x i32.or x, {}) implies that the Lys ’x’ is to be replaced by an idempotent bitwise i32.or operation with itself, absent any specific con-ditions. Notice that, for this specific rule, the commutative property shared by Lus and rus, symbolized as (LHS, RHS)= (RHS, LHS). Besides, the cond element could be an arbitrary criterion. For instance, the condition for applying the aforementioned rewriting rule could be to ensure that the newly created binary file does not exceed a threshold binary size.
domain
replace 'domain' by 'domain,'
(0)We (1)focus (2)on (3)rewriting (4)rules (5)that (6)guarantee (7)functional (8)equivalence. Functional (9)equivalence (10)refers (11)to (12)the (13)notion (14)that (15)two (16)programs (17)are (18)considered (19)equivalent (20)if, (21)for (22)the (23)same (24)input (25)of (26)the (27)same (28)domain, (29)they (30)produce (31)the (32)same (33)output[32].
(0)We (1)focus (2)on (3)rewriting (4)rules (5)that (6)guarantee (7)functional (8)equivalence. Functional (9)equivalence (10)refers (11)to (12)the (13)notion (14)that (15)two (16)programs (17)are (18)considered (19)equivalent (20)if, (21)for (22)the (23)same (24)input (25)of (26)the (27)same (28)domain (29)they (30)produce (31)the (32)same (33)output[32].
insert '' by 'Overview'
(0)3.1. Overview (1)Overview (2)Overview (3)Overview (4)Overview (5)Overview (6)Overview (7)Overview (8)Overview (9)Overview (10)Overview (11)Overview (12)Overview (13)Overview (14)Overview (15)Overview (16)Overview (17)Overview (18)Overview (19)Overview (20)Overview (21)Overview (22)Overview (23)Overview (24)Overview (25)Overview (26)Overview (27)Overview (28)Overview (29)Overview (30)Overview (31)Overview (32)Overview (33)Overview (34)Overview (35)Overview (36)Overview (37)Overview (38)Overview (39)Overview (40)Overview (41)Overview (42)Overview (43)Overview (44)Overview (45)Overview (46)Overview (47)Overview (48)Overview (49)Overview (50)Overview (51)Overview (52)Overview (53)Overview (54)Overview (55)Overview (56)Overview (57)Overview (58)Overview (59)Overview (60)Overview (61)Overview (62)Overview (63)Overview (64)Overview (65)Overview (66)Overview (67)Overview (68)Overview (69)Overview (70)Overview (71)Overview (72)Overview (73)Overview (74)Overview (75)Overview (76)Overview (77)Overview (78)Overview (79)Overview (80)Overview (81)Overview (82)Overview (83)Overview (84)Overview (85)Overview (86)Overview (87)Overview (88)Overview (89)Overview (90)Overview (91)Overview (92)Overview (93)Overview (94)Overview (95)Overview (96)Overview (97)Overview (98)Overview
(0)3.1. Overview
e-graph e-graph
Possible typo: you repeated a word
Input wasm binary transformed binary IR y IR 2 4 oe 0 meray ee O'To e-graph e-graph Lt apaeeaeien ee ! traversal Output diversified wasm binary wasm-mutate / Figure 1: WASM-MUTATE high-level architecture. It generates semantically equivalent variants from a given WebAssembly binary input. Its central approach involves synthesizing these variants by substituting parts of the original binary using rewriting rules, boosted by diversification space traversals using e-graphs(refer to subsection 3.3).
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)4 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)4 (5)of (6)25
i64)))
replace 'i64)))' by 'i64))'
(0)RHS (1)(module (2)(type (3)(;2;) (4)(func (5)(param (6)i32 (7)£32) (8)(result (9)i64)) (10)a (11)(func (12)() (13)(type (14)@) (15)(param (16)i32 (17)£32) (18)(result (19)i64) (20)eee (21)i64.const (22)Q)
(0)RHS (1)(module (2)(type (3)(;2;) (4)(func (5)(param (6)i32 (7)£32) (8)(result (9)i64))) (10)a (11)(func (12)() (13)(type (14)@) (15)(param (16)i32 (17)£32) (18)(result (19)i64) (20)eee (21)i64.const (22)Q)
i64)))
replace 'i64)))' by 'i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))'
(0)LHS (1)(module (2)(type (3)() (4)(func (5)(param (6)i32 (7)£32) (8)(result (9)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
(0)LHS (1)(module (2)(type (3)() (4)(func (5)(param (6)i32 (7)£32) (8)(result (9)i64)))
having
delete 'having' by ''
(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)attackers (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. For (25)instance, (26)it (27)can (28)obstruct (29)signature-based (30)identification (31)[8]. Narayan (32)and (33)colleagues (34)have (35)demonstrated (36)the (37)feasibility (38)of (39)Return-Oriented (40)Programming (41)(ROP) (42)attacks (43)[38], (44)the (45)removal (46)of (47)dead (48)code (49)can (50)stop (51)jumps (52)to (53)harmful (54)behaviors (55)within (56)the (57)binary. On (58)the (59)other (60)hand, (61)the (62)act (63)of (64)removing (65)dead (66)code (67)reduces (68)the (69)binary’s (70)size, (71)improving (72)its (73)non-functional (74)properties, (75)in (76)particular (77)bandwidth (78)constraints.
(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)ac-tors (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. (25)For (26)instance, (27)it (28)can (29)obstruct (30)signature-based (31)identification (32)[8]. With (33)Narayan (34)and (35)colleagues (36)having (37)demonstrated (38)the (39)feasibility (40)of (41)Return-Oriented (42)Programming (43)(ROP) (44)attacks (45)[38], (46)the (47)removal (48)of (49)dead (50)code (51)can (52)stop (53)jumps (54)to (55)harmful (56)behaviors (57)within (58)the (59)binary. On (60)the (61)other (62)hand, (63)the (64)act (65)of (66)removing (67)dead (68)code (69)reduces (70)the (71)binary’s (72)size, (73)improving (74)its (75)non-functional (76)properties, (77)in (78)particular (79)bandwidth (80)constraints.
colleagues
replace 'colleagues' by 'have'
(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)attackers (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. For (25)instance, (26)it (27)can (28)obstruct (29)signature-based (30)identification (31)[8]. Narayan (32)and (33)colleagues (34)have (35)demonstrated (36)the (37)feasibility (38)of (39)Return-Oriented (40)Programming (41)(ROP) (42)attacks (43)[38], (44)the (45)removal (46)of (47)dead (48)code (49)can (50)stop (51)jumps (52)to (53)harmful (54)behaviors (55)within (56)the (57)binary. On (58)the (59)other (60)hand, (61)the (62)act (63)of (64)removing (65)dead (66)code (67)reduces (68)the (69)binary’s (70)size, (71)improving (72)its (73)non-functional (74)properties, (75)in (76)particular (77)bandwidth (78)constraints.
(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)ac-tors (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. (25)For (26)instance, (27)it (28)can (29)obstruct (30)signature-based (31)identification (32)[8]. With (33)Narayan (34)and (35)colleagues (36)having (37)demonstrated (38)the (39)feasibility (40)of (41)Return-Oriented (42)Programming (43)(ROP) (44)attacks (45)[38], (46)the (47)removal (48)of (49)dead (50)code (51)can (52)stop (53)jumps (54)to (55)harmful (56)behaviors (57)within (58)the (59)binary. On (60)the (61)other (62)hand, (63)the (64)act (65)of (66)removing (67)dead (68)code (69)reduces (70)the (71)binary’s (72)size, (73)improving (74)its (75)non-functional (76)properties, (77)in (78)particular (79)bandwidth (80)constraints.
and
replace 'and' by 'colleagues'
(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)attackers (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. For (25)instance, (26)it (27)can (28)obstruct (29)signature-based (30)identification (31)[8]. Narayan (32)and (33)colleagues (34)have (35)demonstrated (36)the (37)feasibility (38)of (39)Return-Oriented (40)Programming (41)(ROP) (42)attacks (43)[38], (44)the (45)removal (46)of (47)dead (48)code (49)can (50)stop (51)jumps (52)to (53)harmful (54)behaviors (55)within (56)the (57)binary. On (58)the (59)other (60)hand, (61)the (62)act (63)of (64)removing (65)dead (66)code (67)reduces (68)the (69)binary’s (70)size, (71)improving (72)its (73)non-functional (74)properties, (75)in (76)particular (77)bandwidth (78)constraints.
(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)ac-tors (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. (25)For (26)instance, (27)it (28)can (29)obstruct (30)signature-based (31)identification (32)[8]. With (33)Narayan (34)and (35)colleagues (36)having (37)demonstrated (38)the (39)feasibility (40)of (41)Return-Oriented (42)Programming (43)(ROP) (44)attacks (45)[38], (46)the (47)removal (48)of (49)dead (50)code (51)can (52)stop (53)jumps (54)to (55)harmful (56)behaviors (57)within (58)the (59)binary. On (60)the (61)other (62)hand, (63)the (64)act (65)of (66)removing (67)dead (68)code (69)reduces (70)the (71)binary’s (72)size, (73)improving (74)its (75)non-functional (76)properties, (77)in (78)particular (79)bandwidth (80)constraints.
Narayan
replace 'Narayan' by 'and'
(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)attackers (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. For (25)instance, (26)it (27)can (28)obstruct (29)signature-based (30)identification (31)[8]. Narayan (32)and (33)colleagues (34)have (35)demonstrated (36)the (37)feasibility (38)of (39)Return-Oriented (40)Programming (41)(ROP) (42)attacks (43)[38], (44)the (45)removal (46)of (47)dead (48)code (49)can (50)stop (51)jumps (52)to (53)harmful (54)behaviors (55)within (56)the (57)binary. On (58)the (59)other (60)hand, (61)the (62)act (63)of (64)removing (65)dead (66)code (67)reduces (68)the (69)binary’s (70)size, (71)improving (72)its (73)non-functional (74)properties, (75)in (76)particular (77)bandwidth (78)constraints.
(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)ac-tors (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. (25)For (26)instance, (27)it (28)can (29)obstruct (30)signature-based (31)identification (32)[8]. With (33)Narayan (34)and (35)colleagues (36)having (37)demonstrated (38)the (39)feasibility (40)of (41)Return-Oriented (42)Programming (43)(ROP) (44)attacks (45)[38], (46)the (47)removal (48)of (49)dead (50)code (51)can (52)stop (53)jumps (54)to (55)harmful (56)behaviors (57)within (58)the (59)binary. On (60)the (61)other (62)hand, (63)the (64)act (65)of (66)removing (67)dead (68)code (69)reduces (70)the (71)binary’s (72)size, (73)improving (74)its (75)non-functional (76)properties, (77)in (78)particular (79)bandwidth (80)constraints.
With
replace 'With' by 'Narayan'
(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)attackers (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. For (25)instance, (26)it (27)can (28)obstruct (29)signature-based (30)identification (31)[8]. Narayan (32)and (33)colleagues (34)have (35)demonstrated (36)the (37)feasibility (38)of (39)Return-Oriented (40)Programming (41)(ROP) (42)attacks (43)[38], (44)the (45)removal (46)of (47)dead (48)code (49)can (50)stop (51)jumps (52)to (53)harmful (54)behaviors (55)within (56)the (57)binary. On (58)the (59)other (60)hand, (61)the (62)act (63)of (64)removing (65)dead (66)code (67)reduces (68)the (69)binary’s (70)size, (71)improving (72)its (73)non-functional (74)properties, (75)in (76)particular (77)bandwidth (78)constraints.
(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)ac-tors (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. (25)For (26)instance, (27)it (28)can (29)obstruct (30)signature-based (31)identification (32)[8]. With (33)Narayan (34)and (35)colleagues (36)having (37)demonstrated (38)the (39)feasibility (40)of (41)Return-Oriented (42)Programming (43)(ROP) (44)attacks (45)[38], (46)the (47)removal (48)of (49)dead (50)code (51)can (52)stop (53)jumps (54)to (55)harmful (56)behaviors (57)within (58)the (59)binary. On (60)the (61)other (62)hand, (63)the (64)act (65)of (66)removing (67)dead (68)code (69)reduces (70)the (71)binary’s (72)size, (73)improving (74)its (75)non-functional (76)properties, (77)in (78)particular (79)bandwidth (80)constraints.
ac-tors
replace 'ac-tors' by 'attackers'
(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)attackers (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. For (25)instance, (26)it (27)can (28)obstruct (29)signature-based (30)identification (31)[8]. Narayan (32)and (33)colleagues (34)have (35)demonstrated (36)the (37)feasibility (38)of (39)Return-Oriented (40)Programming (41)(ROP) (42)attacks (43)[38], (44)the (45)removal (46)of (47)dead (48)code (49)can (50)stop (51)jumps (52)to (53)harmful (54)behaviors (55)within (56)the (57)binary. On (58)the (59)other (60)hand, (61)the (62)act (63)of (64)removing (65)dead (66)code (67)reduces (68)the (69)binary’s (70)size, (71)improving (72)its (73)non-functional (74)properties, (75)in (76)particular (77)bandwidth (78)constraints.
(0)Eliminating (1)dead (2)code (3)serves (4)a (5)dual (6)purpose: (7)it (8)mini-mizes (9)the (10)attack (11)surface (12)available (13)to (14)potential (15)malicious (16)ac-tors (17)[2] (18)and (19)strengthens (20)the (21)resilience (22)of (23)security (24)protocols. (25)For (26)instance, (27)it (28)can (29)obstruct (30)signature-based (31)identification (32)[8]. With (33)Narayan (34)and (35)colleagues (36)having (37)demonstrated (38)the (39)feasibility (40)of (41)Return-Oriented (42)Programming (43)(ROP) (44)attacks (45)[38], (46)the (47)removal (48)of (49)dead (50)code (51)can (52)stop (53)jumps (54)to (55)harmful (56)behaviors (57)within (58)the (59)binary. On (60)the (61)other (62)hand, (63)the (64)act (65)of (66)removing (67)dead (68)code (69)reduces (70)the (71)binary’s (72)size, (73)improving (74)its (75)non-functional (76)properties, (77)in (78)particular (79)bandwidth (80)constraints.
)
Unpaired symbol: ‘(’ seems to be missing
RHS -(module (import "" "" (func)))
signa-tures
replace 'signa-tures' by 'signs'
(0)This (1)transformation (2)generates (3)random (4)function (5)signs (6)with (7)a (8)random (9)number (10)of (11)parameters (12)and (13)results (14)count. This (15)rewriting (16)rule (17)does (18)not (19)affect (20)the (21)runtime (22)behavior (23)of (24)the (25)variant. It (26)also (27)guarantees (28)that (29)the (30)index (31)of (32)the (33)already (34)defined (35)types (36)is (37)consistent (38)after (39)the (40)addition (41)of (42)a (43)new (44)type. This (45)is (46)because (47)WebAssembly (48)programs (49)cannot (50)access (51)or (52)use (53)a (54)type (55)definition (56)during (57)runtime, (58)they (59)are (60)only (61)used (62)to (63)validate (64)the (65)signature (66)of (67)a (68)function (69)during (70)compilation (71)and (72)validation (73)in (74)the (75)host (76)engine. From (77)the (78)security (79)perspective, (80)this (81)transformation (82)prevents (83)static (84)binary (85)analysis. For (86)example, (87)to (88)avoid (89)malware (90)detection (91)based (92)on (93)a (94)signature (95)set (96)[8].
(0)This (1)transformation (2)generates (3)random (4)function (5)signa-tures (6)with (7)a (8)random (9)number (10)of (11)parameters (12)and (13)results (14)count. (15)This (16)rewriting (17)rule (18)does (19)not (20)affect (21)the (22)runtime (23)behavior (24)of (25)the (26)variant. It (27)also (28)guarantees (29)that (30)the (31)index (32)of (33)the (34)already (35)defined (36)types (37)is (38)consistent (39)after (40)the (41)addition (42)of (43)a (44)new (45)type. (46)This (47)is (48)because (49)WebAssembly (50)programs (51)cannot (52)access (53)or (54)use (55)a (56)type (57)definition (58)during (59)runtime, (60)they (61)are (62)only (63)used (64)to (65)validate (66)the (67)signature (68)of (69)a (70)function (71)during (72)compilation (73)and (74)validation (75)in (76)the (77)host (78)engine. From (79)the (80)security (81)perspective, (82)this (83)transformation (84)prevents (85)static (86)binary (87)analysis. For (88)example, (89)to (90)avoid (91)malware (92)detection (93)based (94)on (95)a (96)signature (97)set (98)[8].
(func)))
replace '(func)))' by '(func))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))'
(0)LHS (1)(module (2)(type (3)(func))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
(0)LHS (1)(module (2)(type (3)(func)))
i64)))
delete 'i64)))' by ''
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))
i32
delete 'i32' by ''
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))
(result
delete '(result' by ''
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))
i64)
delete 'i64)' by ''
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))
(param
delete '(param' by ''
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))
(func
delete '(func' by ''
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))
i64))))
replace 'i64))))' by 'i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))'
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
(0)RHS (1)(module (2)(type (3)(+ (4)(type (5)() (6)(func (7)(param (8)i32) (9)(result (10)i64)))) (11)(func (12)(param (13)i64) (14)(result (15)i32 (16)i64)))
removes:
replace 'removes:' by 'removes'
(0)Remove (1)dead (2)code: (3)WASM-MUTATE (4)can (5)randomly (6)remove (7)dead (8)code. In (9)particular, (10)WASM-MUTATE (11)removes (12)functions, (13)types, (14)custom (15)sections, (16)imports, (17)tables, (18)memories, (19)globals, (20)data (21)segments, (22)and (23)elements (24)that (25)can (26)be (27)validated (28)as (29)dead (30)code (31)with (32)guarantees. For (33)instance, (34)to (35)delete (36)a (37)memory (38)declaration, (39)the (40)binary (41)code (42)must (43)not (44)contain (45)a (46)memory (47)access (48)operation. Separated (49)rewriting (50)rules (51)are (52)included (53)within (54)WASM-MUTATE (55)for (56)each (57)of (58)the (59)elements (60)above. For (61)a (62)more (63)concrete (64)example, (65)the (66)following (67)listing (68)illustrates (69)the (70)case (71)of (72)a (73)function (74)removal.
(0)Remove (1)dead (2)code: (3)WASM-MUTATE (4)can (5)randomly (6)remove (7)dead (8)code. In (9)particular, (10)WASM-MUTATE (11)removes: (12)functions, (13)types, (14)custom (15)sections, (16)imports, (17)tables, (18)memories, (19)globals, (20)data (21)segments, (22)and (23)elements (24)that (25)can (26)be (27)validated (28)as (29)dead (30)code (31)with (32)guarantees. For (33)instance, (34)to (35)delete (36)a (37)memory (38)declaration, (39)the (40)binary (41)code (42)must (43)not (44)contain (45)a (46)memory (47)access (48)operation. Separated (49)rewriting (50)rules (51)are (52)included (53)within (54)WASM-MUTATE (55)for (56)each (57)of (58)the (59)elements (60)above. For (61)a (62)more (63)concrete (64)example, (65)the (66)following (67)listing (68)illustrates (69)the (70)case (71)of (72)a (73)function (74)removal.
i64)))
replace 'i64)))' by 'i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))'
(0)Add (1)type: (2)In (3)WebAssembly, (4)the (5)type (6)section (7)wraps (8)definitions (9)of (10)signatures (11)for (12)the (13)binary (14)functions. WASM-MUTATE (15)implements (16)two (17)rewriting (18)rules, (19)one (20)of (21)which (22)is (23)illustrated (24)in (25)the (26)following. LHS (27)(module (28)(type (29)(;2;) (30)(func (31)(param (32)i32) (33)(result (34)i64))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
(0)Add (1)type: (2)In (3)WebAssembly, (4)the (5)type (6)section (7)wraps (8)definitions (9)of (10)signatures (11)for (12)the (13)binary (14)functions. WASM-MUTATE (15)implements (16)two (17)rewriting (18)rules, (19)one (20)of (21)which (22)is (23)illustrated (24)in (25)the (26)following. (27)LHS (28)(module (29)(type (30)(;2;) (31)(func (32)(param (33)i32) (34)(result (35)i64)))
imple-mented
replace 'imple-mented' by 'implemented'
(0)In (1)total, (2)there (3)are (4)135 (5)possible (6)rewriting (7)rules (8)implemented (9)in (10)WASM-MUTATE, (11)those (12)rules (13)are (14)grouped (15)under (16)several (17)categories, (18)called (19)hereafter (20)meta-rules. For (21)example, (22)125 (23)rewriting (24)rules (25)are (26)implemented (27)as (28)part (29)of (30)a (31)peephole (32)meta-rule. In (33)the (34)following, (35)we (36)present (37)7 (38)meta-rules.
(0)In (1)total, (2)there (3)are (4)135 (5)possible (6)rewriting (7)rules (8)imple-mented (9)in (10)WASM-MUTATE, (11)those (12)rules (13)are (14)grouped (15)under (16)several (17)categories, (18)called (19)hereafter (20)meta-rules. For (21)example, (22)125 (23)rewriting (24)rules (25)are (26)implemented (27)as (28)part (29)of (30)a (31)peephole (32)meta-rule. In (33)the (34)following, (35)we (36)present (37)7 (38)meta-rules.
Rules
replace 'Rules' by 'Rules.'
(0)3.2. WebAssembly (1)Rewriting (2)Rules.
(0)3.2. WebAssembly (1)Rewriting (2)Rules
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)5 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)5 (5)of (6)25
Mena))
replace 'Mena))' by 'Mena))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))'
(0)RHS (1)(module (2)(func...) (3)(132.eqz (4)Cif (5)Bleise (6)Mena))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
(0)RHS (1)(module (2)(func...) (3)(132.eqz (4)Cif (5)Bleise (6)Mena))
((block
replace '((block' by '(block'
(0)RHS (1)(module (2)(func...) (3)(block (4)(block (5)br_if (6)@ (7)br (8)1 (9)end) (10)(loop (11)br_if (12)0 (13)end) (14)end))
(0)RHS (1)(module (2)(func...) (3)((block (4)(block (5)br_if (6)@ (7)br (8)1 (9)end) (10)(loop (11)br_if (12)0 (13)end) (14)end))
if
replace 'if' by 'If'
(0)LHS (1)(module (2)(func... Con (3)o-. If (4)@ (5)Blend)
(0)LHS (1)(module (2)(func... (3)con (4)o-. if (5)@ (6)Blend)
con
replace 'con' by 'Con'
(0)LHS (1)(module (2)(func... Con (3)o-. If (4)@ (5)Blend)
(0)LHS (1)(module (2)(func... (3)con (4)o-. if (5)@ (6)Blend)
(
Unpaired symbol: ‘)’ seems to be missing
LHS (module (func... con o-. if @ Blend)
end)
replace 'end)' by 'ends)!'
(0)To (1)swap (2)an (3)if-construction (4)in (5)WebAssembly, (6)WASM-MUTATE (7)inserts (8)a (9)negation (10)of (11)the (12)value (13)at (14)the (15)top (16)of (17)the (18)stack (19)right (20)before (21)the (22)if (23)instruction. In (24)the (25)following (26)rewriting (27)rule, (28)we (29)show (30)how (31)WASM-MUTATE (32)performs (33)this (34)rewriting. LHS (35)(module (36)Funes)! (37)(condition (38)C (39)(if (40)A (41)else (42)B (43)ends)!
(0)To (1)swap (2)an (3)if-construction (4)in (5)WebAssembly, (6)WASM-MUTATE (7)inserts (8)a (9)negation (10)of (11)the (12)value (13)at (14)the (15)top (16)of (17)the (18)stack (19)right (20)before (21)the (22)if (23)instruction. In (24)the (25)following (26)rewriting (27)rule, (28)we (29)show (30)how (31)WASM-MUTATE (32)performs (33)this (34)rewriting. (35)LHS (36)(module (37)Funes)! (38)(condition (39)C (40)(if (41)A (42)else (43)B (44)end)
swapping:
delete 'swapping:' by ''
(0)In (1)WebAssembly, (2)an (3)if-construction (4)consists (5)of (6)a (7)consequence (8)and (9)an (10)alternative. The (11)branching (12)condition (13)is (14)executed (15)right (16)before (17)the (18)if (19)instruction. If (20)the (21)value (22)at (23)the (24)top (25)of (26)the (27)stack (28)is (29)greater (30)than (31)0, (32)then (33)the (34)consequence (35)code (36)is (37)executed, (38)otherwise (39)the (40)alternative (41)code (42)is (43)run. The (44)if (45)swapping (46)transformation (47)swaps (48)the (49)consequence (50)and (51)alternative (52)codes (53)of (54)an (55)if-construction.
(0)If (1)swapping: (2)In (3)WebAssembly, (4)an (5)if-construction (6)consists (7)of (8)a (9)consequence (10)and (11)an (12)alternative. The (13)branching (14)condition (15)is (16)executed (17)right (18)before (19)the (20)if (21)instruction. If (22)the (23)value (24)at (25)the (26)top (27)of (28)the (29)stack (30)is (31)greater (32)than (33)0, (34)then (35)the (36)consequence (37)code (38)is (39)executed, (40)otherwise (41)the (42)alternative (43)code (44)is (45)run. The (46)if (47)swapping (48)transformation (49)swaps (50)the (51)consequence (52)and (53)alternative (54)codes (55)of (56)an (57)if-construction.
If
delete 'If' by ''
(0)In (1)WebAssembly, (2)an (3)if-construction (4)consists (5)of (6)a (7)consequence (8)and (9)an (10)alternative. The (11)branching (12)condition (13)is (14)executed (15)right (16)before (17)the (18)if (19)instruction. If (20)the (21)value (22)at (23)the (24)top (25)of (26)the (27)stack (28)is (29)greater (30)than (31)0, (32)then (33)the (34)consequence (35)code (36)is (37)executed, (38)otherwise (39)the (40)alternative (41)code (42)is (43)run. The (44)if (45)swapping (46)transformation (47)swaps (48)the (49)consequence (50)and (51)alternative (52)codes (53)of (54)an (55)if-construction.
(0)If (1)swapping: (2)In (3)WebAssembly, (4)an (5)if-construction (6)consists (7)of (8)a (9)consequence (10)and (11)an (12)alternative. The (13)branching (14)condition (15)is (16)executed (17)right (18)before (19)the (20)if (21)instruction. If (22)the (23)value (24)at (25)the (26)top (27)of (28)the (29)stack (30)is (31)greater (32)than (33)0, (34)then (35)the (36)consequence (37)code (38)is (39)executed, (40)otherwise (41)the (42)alternative (43)code (44)is (45)run. The (46)if (47)swapping (48)transformation (49)swaps (50)the (51)consequence (52)and (53)alternative (54)codes (55)of (56)an (57)if-construction.
end
delete 'end' by ''
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
block...
replace 'block...' by 'End'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
new
replace 'new' by 'block.'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
a
replace 'a' by 'new'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
of
replace 'of' by 'a'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
introduction
replace 'introduction' by 'of'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
the
replace 'the' by 'introduction'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
to
replace 'to' by 'the'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
due
replace 'due' by 'to'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
required
replace 'required' by 'due'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
is
replace 'is' by 'required'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
modification
replace 'modification' by 'is'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
This
replace 'This' by 'modification'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
one.
replace 'one.' by 'This'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
by
replace 'by' by 'one.'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
increased
replace 'increased' by 'by'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
indices
replace 'indices' by 'increased'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
jumping
replace 'jumping' by 'indices'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
their
replace 'their' by 'jumping'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
need
replace 'need' by 'their'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
which
replace 'which' by 'need'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
body,
replace 'body,' by 'which'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
loop
replace 'loop' by 'body,'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
the
replace 'the' by 'loop'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
outside
replace 'outside' by 'the'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
jumping
replace 'jumping' by 'outside'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
instructions
replace 'instructions' by 'jumping'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
branching
replace 'branching' by 'instructions'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
for
replace 'for' by 'branching'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
except
replace 'except' by 'for'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
ones,
replace 'ones,' by 'except'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
original
replace 'original' by 'ones,'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
the
replace 'the' by 'original'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
mirror
replace 'mirror' by 'the'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
instructions
replace 'instructions' by 'mirror'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
of
replace 'of' by 'instructions'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
groups
replace 'groups' by 'of'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
replicated
replace 'replicated' by 'groups'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
These
replace 'These' by 'replicated'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
copied.
replace 'copied.' by 'These'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
are
replace 'are' by 'copied.'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
instructions
replace 'instructions' by 'are'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
separated
replace 'separated' by 'groups'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
previously
replace 'previously' by 'separated'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
the
replace 'the' by 'previously'
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. As (48)the (49)loop (50)unrolling (51)process (52)unfolds, (53)a (54)new (55)WebAssembly (56)block (57)is (58)created (59)to (60)encompass (61)both (62)the (63)duplicated (64)loop (65)body (66)and (67)the (68)original (69)loop. Within (70)this (71)newly (72)established (73)block, (74)previously (75)separated (76)groups (77)of (78)instructions (79)are (80)copied. These (81)replicated (82)groups (83)of (84)instructions (85)mirror (86)the (87)original (88)ones, (89)except (90)for (91)branching (92)instructions (93)jumping (94)outside (95)the (96)loop (97)body, (98)which (99)need (100)their (101)jumping (102)indices (103)increased (104)by (105)one. This (106)modification (107)is (108)required (109)due (110)to (111)the (112)introduction (113)of (114)a (115)new (116)block. End (117)scope (118)around (119)the (120)loop (121)body, (122)which (123)affects (124)the (125)scope (126)levels (127)of (128)the (129)branching (130)instructions.
(0)When (1)WASM-MUTATE (2)selects (3)a (4)loop (5)for (6)unrolling, (7)its (8)instructions (9)are (10)divided (11)by (12)first-order (13)breaks, (14)which (15)are (16)jumps (17)to (18)the (19)loop’s (20)start. This (21)separation (22)ensures (23)that (24)branching (25)instructions (26)controlling (27)the (28)loop (29)body (30)do (31)not (32)require (33)label (34)index (35)adjustments (36)during (37)unrolling. The (38)same (39)holds (40)for (41)instructions (42)continuing (43)to (44)the (45)next (46)loop (47)iteration. (48)As (49)the (50)loop (51)unrolling (52)process (53)unfolds, (54)a (55)new (56)WebAssembly (57)block (58)is (59)created (60)to (61)encompass (62)both (63)the (64)duplicated (65)loop (66)body (67)and (68)the (69)original (70)loop. Within (71)this (72)newly (73)established (74)block, (75)the (76)previously (77)separated (78)groups (79)of (80)instructions (81)are (82)copied. (83)These (84)replicated (85)groups (86)of (87)instructions (88)mirror (89)the (90)original (91)ones, (92)except (93)for (94)branching (95)instructions (96)jumping (97)outside (98)the (99)loop (100)body, (101)which (102)need (103)their (104)jumping (105)indices (106)increased (107)by (108)one. This (109)modification (110)is (111)required (112)due (113)to (114)the (115)introduction (116)of (117)a (118)new (119)block... end (120)scope (121)around (122)the (123)loop (124)body, (125)which (126)affects (127)the (128)scope (129)levels (130)of (131)the (132)branching (133)instructions.
(
Unpaired symbol: ‘)’ seems to be missing
RHS (module + (@custom "CS42” "xxx. . “
em-ployed
replace 'em-ployed' by 'employed'
(0)Loop (1)Unrolling: (2)Loop (3)unrolling (4)is (5)a (6)technique (7)employed (8)to (9)enhance (10)the (11)performance (12)of (13)programs (14)by (15)reducing (16)loop (17)control (18)overhead (19)[16]. WASM-MUTATE (20)incorporates (21)a (22)loop (23)unrolling (24)transformation (25)and (26)uses (27)the (28)Abstract (29)Syntax (30)Tree (31)(AST) (32)of (33)the (34)original (35)WebAssembly (36)binary (37)to (38)identify (39)loop (40)constructions.
(0)Loop (1)Unrolling: (2)Loop (3)unrolling (4)is (5)a (6)technique (7)em-ployed (8)to (9)enhance (10)the (11)performance (12)of (13)programs (14)by (15)reducing (16)loop (17)control (18)overhead (19)[16]. WASM-MUTATE (20)incorporates (21)a (22)loop (23)unrolling (24)transformation (25)and (26)uses (27)the (28)Abstract (29)Syntax (30)Tree (31)(AST) (32)of (33)the (34)original (35)WebAssembly (36)binary (37)to (38)identify (39)loop (40)constructions.
"CS42”
replace '"CS42”' by '"CS42"'
(0)LHS (1)(module (2)-(@custom (3)"CS42" (4)"zzz..."
(0)LHS (1)(module (2)-(@custom (3)"CS42” (4)"zzz..."
”
Unpaired symbol: ‘“’ seems to be missing
LHS (module -(@custom "CS42” "zzz..."
sections:
delete 'sections:' by ''
(0)Custom (1)sections (2)in (3)Web-Assembly (4)are (5)used (6)to (7)store (8)metadata, (9)such (10)as (11)the (12)name (13)of (14)the (15)compiler (16)that (17)produces (18)the (19)binary (20)or (21)the (22)symbol (23)information (24)for (25)debugging. Thus, (26)this (27)section (28)does (29)not (30)affect (31)the (32)execution (33)of (34)the (35)WebAssembly (36)program. WASM-MUTATE (37)includes (38)one (39)transformation (40)to (41)edit (42)custom (43)sections. This (44)is (45)illustrated (46)in (47)the (48)following (49)rewriting (50)rule.
(0)Edit (1)custom (2)sections: (3)Custom (4)sections (5)in (6)Web-Assembly (7)are (8)used (9)to (10)store (11)metadata, (12)such (13)as (14)the (15)name (16)of (17)the (18)compiler (19)that (20)produces (21)the (22)binary (23)or (24)the (25)symbol (26)information (27)for (28)debugging. Thus, (29)this (30)section (31)does (32)not (33)affect (34)the (35)execution (36)of (37)the (38)WebAssembly (39)program. WASM-MUTATE (40)includes (41)one (42)transformation (43)to (44)edit (45)custom (46)sections. This (47)is (48)illustrated (49)in (50)the (51)following (52)rewriting (53)rule.
custom
delete 'custom' by ''
(0)Custom (1)sections (2)in (3)Web-Assembly (4)are (5)used (6)to (7)store (8)metadata, (9)such (10)as (11)the (12)name (13)of (14)the (15)compiler (16)that (17)produces (18)the (19)binary (20)or (21)the (22)symbol (23)information (24)for (25)debugging. Thus, (26)this (27)section (28)does (29)not (30)affect (31)the (32)execution (33)of (34)the (35)WebAssembly (36)program. WASM-MUTATE (37)includes (38)one (39)transformation (40)to (41)edit (42)custom (43)sections. This (44)is (45)illustrated (46)in (47)the (48)following (49)rewriting (50)rule.
(0)Edit (1)custom (2)sections: (3)Custom (4)sections (5)in (6)Web-Assembly (7)are (8)used (9)to (10)store (11)metadata, (12)such (13)as (14)the (15)name (16)of (17)the (18)compiler (19)that (20)produces (21)the (22)binary (23)or (24)the (25)symbol (26)information (27)for (28)debugging. Thus, (29)this (30)section (31)does (32)not (33)affect (34)the (35)execution (36)of (37)the (38)WebAssembly (39)program. WASM-MUTATE (40)includes (41)one (42)transformation (43)to (44)edit (45)custom (46)sections. This (47)is (48)illustrated (49)in (50)the (51)following (52)rewriting (53)rule.
Edit
delete 'Edit' by ''
(0)Custom (1)sections (2)in (3)Web-Assembly (4)are (5)used (6)to (7)store (8)metadata, (9)such (10)as (11)the (12)name (13)of (14)the (15)compiler (16)that (17)produces (18)the (19)binary (20)or (21)the (22)symbol (23)information (24)for (25)debugging. Thus, (26)this (27)section (28)does (29)not (30)affect (31)the (32)execution (33)of (34)the (35)WebAssembly (36)program. WASM-MUTATE (37)includes (38)one (39)transformation (40)to (41)edit (42)custom (43)sections. This (44)is (45)illustrated (46)in (47)the (48)following (49)rewriting (50)rule.
(0)Edit (1)custom (2)sections: (3)Custom (4)sections (5)in (6)Web-Assembly (7)are (8)used (9)to (10)store (11)metadata, (12)such (13)as (14)the (15)name (16)of (17)the (18)compiler (19)that (20)produces (21)the (22)binary (23)or (24)the (25)symbol (26)information (27)for (28)debugging. Thus, (29)this (30)section (31)does (32)not (33)affect (34)the (35)execution (36)of (37)the (38)WebAssembly (39)program. WASM-MUTATE (40)includes (41)one (42)transformation (43)to (44)edit (45)custom (46)sections. This (47)is (48)illustrated (49)in (50)the (51)following (52)rewriting (53)rule.
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)6 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)6 (5)of (6)25
i32.const.2
delete 'i32.const.2' by ''
(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2.
(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2
?x
replace '?x' by 'i32.const.2.'
(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2.
(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2
i32.mul
replace 'i32.mul' by '?x'
(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2.
(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2
RHS
replace 'RHS' by 'i32.mul'
(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2.
(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2
?x
replace '?x' by 'RHS'
(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2.
(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2
insert '' by '?x'
(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2.
(0)LHS (1)i32.add (2)?x (3)?x (4)RHS (5)i32.mul (6)?x (7)i32.const.2
i32.const.8
replace 'i32.const.8' by 'i32.const.'
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8
i32.const.2
replace 'i32.const.2' by 'i32.const.8'
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8
i32.const.3
replace 'i32.const.3' by 'i32.const.2'
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8
i32.shl
replace 'i32.shl' by 'i32.mul'
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8
LHS
replace 'LHS' by 'RHS'
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8
i32.const.1
replace 'i32.const.1' by 'i32.const.3'
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8
insert '' by 'i32.const.1'
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8
insert '' by '?x'
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8
insert '' by 'i32.shl'
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8
insert '' by 'LHS'
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8 (16)RHS (17)i32.mul (18)?x (19)i32.const.
(0)LHS (1)i32.shl (2)?x (3)i32.const.1 (4)LHS (5)i32.shl (6)?x (7)i32.const.3 (8)RHS (9)i32.mul (10)?x (11)i32.const.2 (12)RHS (13)i32.mul (14)?x (15)i32.const.8
Peephole:
delete 'Peephole:' by ''
(0)This (1)meta-rule (2)is (3)about (4)rewriting (5)peephole (6)instruction (7)sequences (8)within (9)function (10)bodies, (11)signifying (12)the (13)most (14)granular (15)level (16)of (17)rewriting. We (18)implement (19)125 (20)rewriting (21)rules (22)for (23)this (24)group (25)in (26)WASM-MUTATE. We (27)include (28)rewriting (29)rules (30)that (31)affect (32)the (33)memory (34)of (35)the (36)binary. For (37)example, (38)we (39)include (40)rewriting (41)rules (42)that (43)create (44)random (45)assignments (46)to (47)newly (48)created (49)global (50)variables. For (51)these (52)rules, (53)we (54)incorporate (55)several (56)conditions, (57)denoted (58)by (59)cond (60), (61)to (62)ensure (63)successful (64)replacement. These (65)conditions (66)can (67)be (68)used (69)interchangeably (70)and (71)combined (72)to (73)constrain (74)transformations.
(0)Peephole: (1)This (2)meta-rule (3)is (4)about (5)rewriting (6)peephole (7)instruction (8)sequences (9)within (10)function (11)bodies, (12)signifying (13)the (14)most (15)granular (16)level (17)of (18)rewriting. We (19)implement (20)125 (21)rewriting (22)rules (23)for (24)this (25)group (26)in (27)WASM-MUTATE. We (28)include (29)rewriting (30)rules (31)that (32)affect (33)the (34)memory (35)of (36)the (37)binary. (38)For (39)example, (40)we (41)include (42)rewriting (43)rules (44)that (45)create (46)random (47)assignments (48)to (49)newly (50)created (51)global (52)variables. For (53)these (54)rules, (55)we (56)incorporate (57)several (58)conditions, (59)denoted (60)by (61)cond (62), (63)to (64)ensure (65)successful (66)replacement. These (67)conditions (68)can (69)be (70)used (71)interchangeably (72)and (73)combined (74)to (75)constrain (76)transformations.
insert '' by 'i32.'
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x
insert '' by 'LHS'
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x
RHS
delete 'RHS' by ''
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x
2y
replace '2y' by 'LHS'
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x
RHS
replace 'RHS' by '?x'
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x
insert '' by 'i32.add'
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x
insert '' by '?y'
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x
insert '' by '?x'
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x
select
replace 'select' by 'i32.add'
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x
insert '' by 'RHS'
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x
insert '' by '2y'
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x
insert '' by 'select'
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x (15)LHS (16)i32.add (17)?y (18)?x (19)LHS (20)i32.add (21)?y (22)?x (23)LHS (24)i32.add (25)?y (26)?x (27)LHS (28)i32.add (29)?y (30)?x (31)LHS (32)i32.add (33)?y (34)?x (35)LHS (36)i32.
(0)LHS (1)select (2)?y (3)?y (4)?x (5)LHS (6)i32.add (7)?x (8)?y (9)RHS (10)2y (11)RHS (12)i32.add (13)?y (14)?x
’
Unpaired symbol: ‘‘’ seems to be missing
We have also incorporated commutative rewriting rules. The following three rules provide examples. As discussed earlier, observe that the subexpressions’ type can be changed to any of the original four primitive WebAssembly data types.
insert '' by '132.const.'
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x
insert '' by '132.const.-1'
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x
insert '' by '?x'
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x
insert '' by 'RHS'
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x
insert '' by 'i32.const.-1'
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x
insert '' by 'f32.const.1'
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x
insert '' by 'f32.mul'
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x
insert '' by 'LHS'
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x
insert '' by 'i32.or'
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x (12)132.const.-1 (13)LHS (14)i32.or (15)?x (16)132.const.-1 (17)LHS (18)f32.mul (19)?x (20)f32.const.1 (21)RHS (22)i32.const.-1 (23)RHS (24)?x (25)132.const.
(0)LHS (1)i32.or (2)?x (3)132.const.-1 (4)LHS (5)f32.mul (6)?x (7)f32.const.1 (8)RHS (9)i32.const.-1 (10)RHS (11)?x
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)7 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)7 (5)of (6)25
WebAssembly
replace 'WebAssembly' by 'WebAssembly.'
(0)3.3. E-graphs (1)for (2)WebAssembly.
(0)3.3. E-graphs (1)for (2)WebAssembly
insert '' by 'of'
(0)For (1)example, (2)let (3)us (4)consider (5)one (6)program (7)with (8)a (9)single (10)instruction (11)that (12)returns (13)an (14)integer (15)constant, (16)i64.const (17)@. Let (18)us (19)also (20)assume (21)a (22)single (23)rewriting (24)rule, (25)(x, (26)x (27)i64.or (28)x, (29)x (30)instance (31)of (32)ié64). In (33)this (34)example, (35)the (36)program’s (37)control (38)flow (39)graph (40)contains (41)just (42)one (43)node, (44)representing (45)the (46)unique (47)instruction. The (48)rewriting (49)rule (50)represents (51)the (52)equivalence (53)for (54)performing (55)an (56)or (57)operation (58)with (59)two (60)equal (61)operands. Figure (62)2 (63)displays (64)the (65)final (66)e-graph (67)data (68)structure (69)constructed (70)out (71)of (72)this (73)single (74)program (75)and (76)rewriting (77)rule. We (78)start (79)by (80)adding (81)the (82)unique (83)program (84)instruction (85)i64.const (86)@ (87)as (88)an (89)e-node (90)(depicted (91)by (92)the (93)leftmost (94)solid (95)rectangle (96)node (97)in (98)the (99)figure). Next, (100)we (101)generate (102)e-nodes (103)from (104)the (105)rewriting (106)rule (107)(the (108)rightmost (109)solid (110)rectangle) (111)by (112)introducing (113)a (114)new (115)e-node, (116)ié4.or, (117)and (118)creating (119)edges (120)to (121)the (122)x (123)e-node. Following (124)this, (125)we (126)establish (127)equivalence. The (128)rewriting (129)rule (130)combines (131)the (132)two (133)e-nodes (134)into (135)a (136)single (137)e-class (138)(indicated (139)by (140)the (141)dashed (142)rectangle (143)node (144)in (145)the (146)figure). As (147)a (148)result, (149)we (150)update (151)the (152)edges (153)to (154)point (155)to (156)the (157)x (158)symbol (159)e-class.
(0)For (1)example, (2)let (3)us (4)consider (5)one (6)program (7)with (8)a (9)single (10)instruction (11)that (12)returns (13)an (14)integer (15)constant, (16)i64.const (17)@. Let (18)us (19)also (20)assume (21)a (22)single (23)rewriting (24)rule, (25)(x, (26)x (27)i64.or (28)x, (29)x (30)instanceof (31)ié64). In (32)this (33)example, (34)the (35)program’s (36)control (37)flow (38)graph (39)contains (40)just (41)one (42)node, (43)representing (44)the (45)unique (46)instruction. The (47)rewriting (48)rule (49)represents (50)the (51)equivalence (52)for (53)performing (54)an (55)or (56)operation (57)with (58)two (59)equal (60)operands. (61)Figure (62)2 (63)displays (64)the (65)final (66)e-graph (67)data (68)structure (69)constructed (70)out (71)of (72)this (73)single (74)program (75)and (76)rewriting (77)rule. We (78)start (79)by (80)adding (81)the (82)unique (83)program (84)instruction (85)i64.const (86)@ (87)as (88)an (89)e-node (90)(depicted (91)by (92)the (93)leftmost (94)solid (95)rectangle (96)node (97)in (98)the (99)figure). Next, (100)we (101)generate (102)e-nodes (103)from (104)the (105)rewriting (106)rule (107)(the (108)rightmost (109)solid (110)rectangle) (111)by (112)introducing (113)a (114)new (115)e-node, (116)ié4.or, (117)and (118)creating (119)edges (120)to (121)the (122)x (123)e-node. Following (124)this, (125)we (126)establish (127)equivalence. The (128)rewriting (129)rule (130)combines (131)the (132)two (133)e-nodes (134)into (135)a (136)single (137)e-class (138)(indicated (139)by (140)the (141)dashed (142)rectangle (143)node (144)in (145)the (146)figure). As (147)a (148)result, (149)we (150)update (151)the (152)edges (153)to (154)point (155)to (156)the (157)x (158)symbol (159)e-class.
instanceof
replace 'instanceof' by 'instance'
(0)For (1)example, (2)let (3)us (4)consider (5)one (6)program (7)with (8)a (9)single (10)instruction (11)that (12)returns (13)an (14)integer (15)constant, (16)i64.const (17)@. Let (18)us (19)also (20)assume (21)a (22)single (23)rewriting (24)rule, (25)(x, (26)x (27)i64.or (28)x, (29)x (30)instance (31)of (32)ié64). In (33)this (34)example, (35)the (36)program’s (37)control (38)flow (39)graph (40)contains (41)just (42)one (43)node, (44)representing (45)the (46)unique (47)instruction. The (48)rewriting (49)rule (50)represents (51)the (52)equivalence (53)for (54)performing (55)an (56)or (57)operation (58)with (59)two (60)equal (61)operands. Figure (62)2 (63)displays (64)the (65)final (66)e-graph (67)data (68)structure (69)constructed (70)out (71)of (72)this (73)single (74)program (75)and (76)rewriting (77)rule. We (78)start (79)by (80)adding (81)the (82)unique (83)program (84)instruction (85)i64.const (86)@ (87)as (88)an (89)e-node (90)(depicted (91)by (92)the (93)leftmost (94)solid (95)rectangle (96)node (97)in (98)the (99)figure). Next, (100)we (101)generate (102)e-nodes (103)from (104)the (105)rewriting (106)rule (107)(the (108)rightmost (109)solid (110)rectangle) (111)by (112)introducing (113)a (114)new (115)e-node, (116)ié4.or, (117)and (118)creating (119)edges (120)to (121)the (122)x (123)e-node. Following (124)this, (125)we (126)establish (127)equivalence. The (128)rewriting (129)rule (130)combines (131)the (132)two (133)e-nodes (134)into (135)a (136)single (137)e-class (138)(indicated (139)by (140)the (141)dashed (142)rectangle (143)node (144)in (145)the (146)figure). As (147)a (148)result, (149)we (150)update (151)the (152)edges (153)to (154)point (155)to (156)the (157)x (158)symbol (159)e-class.
(0)For (1)example, (2)let (3)us (4)consider (5)one (6)program (7)with (8)a (9)single (10)instruction (11)that (12)returns (13)an (14)integer (15)constant, (16)i64.const (17)@. Let (18)us (19)also (20)assume (21)a (22)single (23)rewriting (24)rule, (25)(x, (26)x (27)i64.or (28)x, (29)x (30)instanceof (31)ié64). In (32)this (33)example, (34)the (35)program’s (36)control (37)flow (38)graph (39)contains (40)just (41)one (42)node, (43)representing (44)the (45)unique (46)instruction. The (47)rewriting (48)rule (49)represents (50)the (51)equivalence (52)for (53)performing (54)an (55)or (56)operation (57)with (58)two (59)equal (60)operands. (61)Figure (62)2 (63)displays (64)the (65)final (66)e-graph (67)data (68)structure (69)constructed (70)out (71)of (72)this (73)single (74)program (75)and (76)rewriting (77)rule. We (78)start (79)by (80)adding (81)the (82)unique (83)program (84)instruction (85)i64.const (86)@ (87)as (88)an (89)e-node (90)(depicted (91)by (92)the (93)leftmost (94)solid (95)rectangle (96)node (97)in (98)the (99)figure). Next, (100)we (101)generate (102)e-nodes (103)from (104)the (105)rewriting (106)rule (107)(the (108)rightmost (109)solid (110)rectangle) (111)by (112)introducing (113)a (114)new (115)e-node, (116)ié4.or, (117)and (118)creating (119)edges (120)to (121)the (122)x (123)e-node. Following (124)this, (125)we (126)establish (127)equivalence. The (128)rewriting (129)rule (130)combines (131)the (132)two (133)e-nodes (134)into (135)a (136)single (137)e-class (138)(indicated (139)by (140)the (141)dashed (142)rectangle (143)node (144)in (145)the (146)figure). As (147)a (148)result, (149)we (150)update (151)the (152)edges (153)to (154)point (155)to (156)the (157)x (158)symbol (159)e-class.
-z
delete '-z' by ''
(0)Cond (1)z (2)= (3)i32 (4)random (5)& (6)y=x (7)-z.
(0)Cond (1)z (2)= (3)i32 (4)random (5)& (6)y= (7)x (8)-z
x
replace 'x' by '-z.'
(0)Cond (1)z (2)= (3)i32 (4)random (5)& (6)y=x (7)-z.
(0)Cond (1)z (2)= (3)i32 (4)random (5)& (6)y= (7)x (8)-z
y=
replace 'y=' by 'y=x'
(0)Cond (1)z (2)= (3)i32 (4)random (5)& (6)y=x (7)-z.
(0)Cond (1)z (2)= (3)i32 (4)random (5)& (6)y= (7)x (8)-z
¥)
replace '¥)' by ').'
(0)LHS (1)?x (2)LHS (3)?x (4)RHS (5)i32.add (6)(i132.const (7)z (8)i32. RHS (9)(nop (10)?x) (11)const (12)).
(0)LHS (1)?x (2)LHS (3)?x (4)RHS (5)i32.add (6)(i132.const (7)z (8)i32. (9)RHS (10)(nop (11)?x) (12)const (13)¥)
"un-folding”
replace '"un-folding”' by '"unfolding"'
(0)As (1)previously (2)mentioned, (3)our (4)work (5)is (6)built (7)on (8)well-established (9)diversification (10)strategies. In (11)the (12)subsequent (13)rewriting (14)rules, (15)we (16)exemplify (17)the (18)porting (19)of (20)two (21)well-known (22)strategies. The (23)leftmost (24)part (25)illustrates (26)the (27)injection (28)of (29)nop (30)instructions (31)[12]. The (32)rightmost (33)part (34)extends (35)the (36)peephole (37)meta-rule (38)with (39)the (40)"unfolding" (41)of (42)constants (43)rewriting (44)rule. In (45)the (46)latter (47)case, (48)statically (49)defined (50)constants (51)are (52)substituted (53)by (54)the (55)sum (56)of (57)two (58)numbers. This (59)sum (60)computes (61)the (62)original (63)constant (64)at (65)runtime.
(0)AS (1)previously (2)mentioned, (3)our (4)work (5)is (6)built (7)on (8)well-established (9)diversification (10)strategies. In (11)the (12)subsequent (13)rewriting (14)rules, (15)we (16)exemplify (17)the (18)porting (19)of (20)two (21)well-known (22)strategies. The (23)leftmost (24)part (25)illustrates (26)the (27)injection (28)of (29)nop (30)instructions (31)[12]. The (32)rightmost (33)part (34)extend (35)the (36)peephole (37)meta-rule (38)with (39)the (40)"un-folding” (41)of (42)constants (43)rewriting (44)rule. (45)In (46)the (47)latter (48)case, (49)statically (50)defined (51)constants (52)are (53)substituted (54)by (55)the (56)sum (57)of (58)two (59)numbers. This (60)sum (61)computes (62)the (63)original (64)constant (65)at (66)runtime.
extend
replace 'extend' by 'extends'
(0)As (1)previously (2)mentioned, (3)our (4)work (5)is (6)built (7)on (8)well-established (9)diversification (10)strategies. In (11)the (12)subsequent (13)rewriting (14)rules, (15)we (16)exemplify (17)the (18)porting (19)of (20)two (21)well-known (22)strategies. The (23)leftmost (24)part (25)illustrates (26)the (27)injection (28)of (29)nop (30)instructions (31)[12]. The (32)rightmost (33)part (34)extends (35)the (36)peephole (37)meta-rule (38)with (39)the (40)"unfolding" (41)of (42)constants (43)rewriting (44)rule. In (45)the (46)latter (47)case, (48)statically (49)defined (50)constants (51)are (52)substituted (53)by (54)the (55)sum (56)of (57)two (58)numbers. This (59)sum (60)computes (61)the (62)original (63)constant (64)at (65)runtime.
(0)AS (1)previously (2)mentioned, (3)our (4)work (5)is (6)built (7)on (8)well-established (9)diversification (10)strategies. In (11)the (12)subsequent (13)rewriting (14)rules, (15)we (16)exemplify (17)the (18)porting (19)of (20)two (21)well-known (22)strategies. The (23)leftmost (24)part (25)illustrates (26)the (27)injection (28)of (29)nop (30)instructions (31)[12]. The (32)rightmost (33)part (34)extend (35)the (36)peephole (37)meta-rule (38)with (39)the (40)"un-folding” (41)of (42)constants (43)rewriting (44)rule. (45)In (46)the (47)latter (48)case, (49)statically (50)defined (51)constants (52)are (53)substituted (54)by (55)the (56)sum (57)of (58)two (59)numbers. This (60)sum (61)computes (62)the (63)original (64)constant (65)at (66)runtime.
AS
replace 'AS' by 'As'
(0)As (1)previously (2)mentioned, (3)our (4)work (5)is (6)built (7)on (8)well-established (9)diversification (10)strategies. In (11)the (12)subsequent (13)rewriting (14)rules, (15)we (16)exemplify (17)the (18)porting (19)of (20)two (21)well-known (22)strategies. The (23)leftmost (24)part (25)illustrates (26)the (27)injection (28)of (29)nop (30)instructions (31)[12]. The (32)rightmost (33)part (34)extends (35)the (36)peephole (37)meta-rule (38)with (39)the (40)"unfolding" (41)of (42)constants (43)rewriting (44)rule. In (45)the (46)latter (47)case, (48)statically (49)defined (50)constants (51)are (52)substituted (53)by (54)the (55)sum (56)of (57)two (58)numbers. This (59)sum (60)computes (61)the (62)original (63)constant (64)at (65)runtime.
(0)AS (1)previously (2)mentioned, (3)our (4)work (5)is (6)built (7)on (8)well-established (9)diversification (10)strategies. In (11)the (12)subsequent (13)rewriting (14)rules, (15)we (16)exemplify (17)the (18)porting (19)of (20)two (21)well-known (22)strategies. The (23)leftmost (24)part (25)illustrates (26)the (27)injection (28)of (29)nop (30)instructions (31)[12]. The (32)rightmost (33)part (34)extend (35)the (36)peephole (37)meta-rule (38)with (39)the (40)"un-folding” (41)of (42)constants (43)rewriting (44)rule. (45)In (46)the (47)latter (48)case, (49)statically (50)defined (51)constants (52)are (53)substituted (54)by (55)the (56)sum (57)of (58)two (59)numbers. This (60)sum (61)computes (62)the (63)original (64)constant (65)at (66)runtime.
"
Unpaired symbol: ‘"’ seems to be missing
AS previously mentioned, our work is built on well-established diversification strategies. In the subsequent rewriting rules, we exemplify the porting of two well-known strategies. The leftmost part illustrates the injection of nop instructions [12]. The rightmost part extend the peephole meta-rule with the "un-folding” of constants rewriting rule. In the latter case, statically defined constants are substituted by the sum of two numbers. This sum computes the original constant at runtime.
insert '' by '4'''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
(0)Class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4’ (10)4' (11)4''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
(0)class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4
insert '' by '4''
(0)Class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4’ (10)4' (11)4''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
(0)class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4
‘4
replace '‘4' by '‘4’'
(0)Class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4’ (10)4' (11)4''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
(0)class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4
class
replace 'class' by 'Class'
(0)Class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4’ (10)4' (11)4''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
(0)class (1)e-& (2)p (3)Yn (4)Cc (5)Oo (6)oO (7)+ (8)wo (9)‘4
class
This sentence does not start with an uppercase letter.
class e-& p Yn Cc Oo oO + wo ‘4
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)8 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)8 (5)of (6)25
WASM-MUTATE,
replace 'WASM-MUTATE,' by 'WASM-MUTATE'
(0)We (1)propose (2)and (3)implement (4)the (5)following (6)algorithm (7)to (8)randomly (9)traverse (10)an (11)e-graph (12)and (13)generate (14)semantically (15)equivalent (16)program (17)variants, (18)see (19)|. It (20)receives (21)an (22)e-graph, (23)an (24)e-class (25)node (26)(initially (27)the (28)root’s (29)e-class), (30)and (31)the (32)maximum (33)depth (34)of (35)expression (36)to (37)extract. The (38)depth (39)parameter (40)ensures (41)that (42)the (43)algorithm (44)is (45)not (46)stuck (47)in (48)an (49)infinite (50)recursion. We (51)select (52)a (53)random (54)e-node (55)from (56)the (57)e-class (58)(lines (59)5 (60)and (61)6), (62)and (63)the (64)process (65)recursively (66)continues (67)with (68)the (69)children (70)of (71)the (72)selected (73)e-node (74)(line (75)8) (76)with (77)a (78)decreasing (79)depth. As (80)soon (81)as (82)the (83)depth (84)becomes (85)zero, (86)the (87)algorithm (88)returns (89)the (90)smallest (91)expression (92)out (93)of (94)the (95)current (96)e-class (97)(line (98)3). The (99)subexpressions (100)are (101)composed (102)together (103)(line (104)10) (105)for (106)each (107)child, (108)and (109)then (110)the (111)entire (112)expression (113)is (114)returned (115)(line (116)11). To (117)the (118)best (119)of (120)our (121)knowledge, (122)WASM-MUTATE (123)is (124)the (125)first (126)practical (127)implementation (128)of (129)random (130)e-graph (131)traversal (132)for (133)WebAssembly.
(0)We (1)propose (2)and (3)implement (4)the (5)following (6)algorithm (7)to (8)randomly (9)traverse (10)an (11)e-graph (12)and (13)generate (14)semantically (15)equivalent (16)program (17)variants, (18)see (19)|. It (20)receives (21)an (22)e-graph, (23)an (24)e-class (25)node (26)(initially (27)the (28)root’s (29)e-class), (30)and (31)the (32)maximum (33)depth (34)of (35)expression (36)to (37)extract. The (38)depth (39)parameter (40)ensures (41)that (42)the (43)algorithm (44)is (45)not (46)stuck (47)in (48)an (49)infinite (50)recursion. We (51)select (52)a (53)random (54)e-node (55)from (56)the (57)e-class (58)(lines (59)5 (60)and (61)6), (62)and (63)the (64)process (65)recursively (66)continues (67)with (68)the (69)children (70)of (71)the (72)selected (73)e-node (74)(line (75)8) (76)with (77)a (78)decreasing (79)depth. As (80)soon (81)as (82)the (83)depth (84)becomes (85)zero, (86)the (87)algorithm (88)returns (89)the (90)smallest (91)expression (92)out (93)of (94)the (95)current (96)e-class (97)(line (98)3). The (99)subexpressions (100)are (101)composed (102)together (103)(line (104)10) (105)for (106)each (107)child, (108)and (109)then (110)the (111)entire (112)expression (113)is (114)returned (115)(line (116)11). (117)To (118)the (119)best (120)of (121)our (122)knowledge, (123)WASM-MUTATE, (124)is (125)the (126)first (127)practical (128)implementation (129)of (130)random (131)e-graph (132)traversal (133)for (134)WebAssembly.
over
delete 'over' by ''
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.
3
delete '3' by ''
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.
Listing
delete 'Listing' by ''
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.
for
delete 'for' by ''
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.
traversal
delete 'traversal' by ''
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.
egraph
delete 'egraph' by ''
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.
»))
delete '»))' by ''
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.
1
delete '1' by ''
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.
i64.const
delete 'i64.const' by ''
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.
1))
replace '1))' by '1))))'
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.
i64)))
replace 'i64)))' by 'i64))'
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64)) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)))) (24)Listing (25)4: (26)Random (27)peephole (28)mutation (29)using (30)e-graph (31)Figure (32)3. The (33)textual (34)format (35)is (36)folded (37)for (38)better (39)understanding.
(0)(module (1)(type (2)(;2;) (3)(func (4)(param (5)i32 (6)£32) (7)(result (8)i64))) (9)(func (10)(;2;) (11)(type (12)@) (13)(param (14)i32 (15)£32) (16)(result (17)i64) (18)(i64.or (19)((i64.add (20)(i64.const (21)0 (22)i64.const (23)1)) (24)i64.const (25)1 (26)»)) (27)Listing (28)4: (29)Random (30)peephole (31)mutation (32)using (33)egraph (34)traversal (35)for (36)Listing (37)3 (38)over (39)e-graph (40)Figure (41)3. The (42)textual (43)format (44)is (45)folded (46)for (47)better (48)understanding.
expr
delete 'expr' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
return
delete 'return' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
lily
delete 'lily' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
©
delete '©' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
&
delete '&' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
Ee
delete 'Ee' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
Gy
delete 'Gy' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
Oy
delete 'Oy' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
rl
delete 'rl' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
SO
delete 'SO' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
{subexpr}
delete '{subexpr}' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
U
delete 'U' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
expr.operands
delete 'expr.operands' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
<—
delete '<—' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
10:
delete '10:' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
1)
delete '1)' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
depth
delete 'depth' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
child,
delete 'child,' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
graph,
delete 'graph,' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
—
delete '—' by ''
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
<—
replace '<—' by '—'
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
graph{eclass]
replace 'graph{eclass]' by 'grapheclass]'
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. 1: (5)procedure (6)TRAVERSE(e (7)— (8)graph, (9)eclass, (10)depth) (11)2: (12)if (13)depth (14)= (15)0 (16)then (17)return (18)smallest_tree_from(e-graph, (19)eclass) (20)else (21)nodes (22)— (23)e (24)— (25)grapheclass] (26)node (27)— (28)random_choice(nodes) (29)expr (30)— (31)(node, (32)operands (33)= (34)[]) (35)for (36)each (37)child (38)€ (39)node.children (40)do (41)subexpr (42)— (43)TRAVERSE(e (44)—
(0)Algorithm (1)1 (2)e-graph (3)traversal (4)algorithm. (5)1: (6)procedure (7)TRAVERSE(e (8)— (9)graph, (10)eclass, (11)depth) (12)2: (13)if (14)depth (15)= (16)0 (17)then (18)return (19)smallest_tree_from(e-graph, (20)eclass) (21)else (22)nodes (23)<— (24)e (25)— (26)graph{eclass] (27)node (28)— (29)random_choice(nodes) (30)expr (31)<— (32)(node, (33)operands (34)= (35)[]) (36)for (37)each (38)child (39)€ (40)node.children (41)do (42)subexpr (43)— (44)TRAVERSE(e (45)— (46)graph, (47)child, (48)depth (49)— (50)1) (51)10: (52)expr.operands (53)<— (54)expr.operands (55)U (56){subexpr} (57)SO (58)rl (59)Oy (60)Gy (61)Ee (62)& (63)© (64)lily (65)return (66)expr
]
Unpaired symbol: ‘[’ seems to be missing
Algorithm 1 e-graph traversal algorithm. 1: procedure TRAVERSE(e — graph, eclass, depth) 2: if depth = 0 then return smallest_tree_from(e-graph, eclass) else nodes <— e — graph{eclass] node — random_choice(nodes) expr <— (node, operands = []) for each child € node.children do subexpr — TRAVERSE(e — graph, child, depth — 1) 10: expr.operands <— expr.operands U {subexpr} SO rl Oy Gy Ee & © lily return expr
equivalence
delete 'equivalence' by ''
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
semantic
delete 'semantic' by ''
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
the
replace 'the' by 'equivalentity'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
guarantees
replace 'guarantees' by 'semantic'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
approach
replace 'approach' by 'the'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
This
replace 'This' by 'guarantees'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
operands.
replace 'operands.' by 'approach'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
their
replace 'their' by 'This'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
and
replace 'and' by 'operands.'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
e-nodes
replace 'e-nodes' by 'their'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
to
replace 'to' by 'and'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
applied
replace 'applied' by 'e-nodes'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
function
replace 'function' by 'to'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
cost
replace 'cost' by 'applied'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
a
replace 'a' by 'function'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
through
replace 'through' by 'cost'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
defined
replace 'defined' by 'a'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
recursively
replace 'recursively' by 'through'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
is
replace 'is' by 'defined'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
process
replace 'process' by 'recursively'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
extraction
replace 'extraction' by 'is'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
the
replace 'the' by 'process'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
when
replace 'when' by 'extraction'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
especially
replace 'especially' by 'the'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
flexi-bility,
replace 'flexi-bility,' by 'when'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
of
replace 'of' by 'especially'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
level
replace 'level' by 'flexibility,'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
high
replace 'high' by 'of'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
a
replace 'a' by 'level'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
achieve
replace 'achieve' by 'high'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
can
replace 'can' by 'a'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
e-graphs
replace 'e-graphs' by 'achieve'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
from
replace 'from' by 'can'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
fragments
replace 'fragments' by 'e-graphs'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
code
replace 'code' by 'from'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
of
replace 'of' by 'fragments'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
extraction
replace 'extraction' by 'code'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
the
replace 'the' by 'of'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
that
replace 'that' by 'extraction'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
illustrate
replace 'illustrate' by 'The'
(0)Willsey (1)et (2)al. The (3)extraction (4)of (5)code (6)fragments (7)from (8)e-graphs (9)can (10)achieve (11)a (12)high (13)level (14)of (15)flexibility, (16)especially (17)when (18)the (19)extraction (20)process (21)is (22)recursively (23)defined (24)through (25)a (26)cost (27)function (28)applied (29)to (30)e-nodes (31)and (32)their (33)operands. This (34)approach (35)guarantees (36)the (37)semantic (38)equivalentity (39)of (40)the (41)extracted (42)code (43)[50]. For (44)example, (45)to (46)obtain (47)the (48)smallest (49)code (50)from (51)an (52)e-graph, (53)one (54)could (55)initiate (56)the (57)extraction (58)process (59)at (60)an (61)e-node (62)and (63)then (64)choose (65)the (66)AST (67)with (68)the (69)smallest (70)size (71)from (72)among (73)the (74)operands (75)of (76)its (77)associated (78)e-class (79)[37]. When (80)the (81)cost (82)function (83)is (84)omitted (85)from (86)the (87)extraction (88)methodology, (89)the (90)following (91)property (92)emerges: (93)Any (94)path (95)traversed (96)through (97)the (98)e-graph (99)will (100)result (101)in (102)a (103)semantically (104)equivalent (105)code (106)variant. This (107)concept (108)is (109)illustrated (110)in (111)Figure (112)2, (113)where (114)it (115)is (116)possible (117)to (118)construct (119)an (120)infinite (121)sequence (122)of (123)"or" (124)operations. In (125)the (126)current (127)study, (128)we (129)leverage (130)this (131)inherent (132)flexibility (133)to (134)generate (135)mutated (136)variants (137)of (138)an (139)original (140)program. The (141)e-graph (142)offers (143)the (144)option (145)for (146)random (147)traversal, (148)allowing (149)for (150)the (151)random (152)selection (153)of (154)an (155)e-node (156)within (157)each (158)e-class (159)visited, (160)thereby (161)yielding (162)an (163)equivalent (164)expression.
(0)Willsey (1)et (2)al. illustrate (3)that (4)the (5)extraction (6)of (7)code (8)fragments (9)from (10)e-graphs (11)can (12)achieve (13)a (14)high (15)level (16)of (17)flexi-bility, (18)especially (19)when (20)the (21)extraction (22)process (23)is (24)recursively (25)defined (26)through (27)a (28)cost (29)function (30)applied (31)to (32)e-nodes (33)and (34)their (35)operands. This (36)approach (37)guarantees (38)the (39)semantic (40)equivalence (41)of (42)the (43)extracted (44)code (45)[50]. For (46)example, (47)to (48)obtain (49)the (50)smallest (51)code (52)from (53)an (54)e-graph, (55)one (56)could (57)initiate (58)the (59)extraction (60)process (61)at (62)an (63)e-node (64)and (65)then (66)choose (67)the (68)AST (69)with (70)the (71)smallest (72)size (73)from (74)among (75)the (76)operands (77)of (78)its (79)associated (80)e-class (81)[37]. When (82)the (83)cost (84)function (85)is (86)omitted (87)from (88)the (89)extraction (90)methodology, (91)the (92)following (93)property (94)emerges: (95)Any (96)path (97)traversed (98)through (99)the (100)e-graph (101)will (102)result (103)in (104)a (105)semantically (106)equivalent (107)code (108)variant. This (109)concept (110)is (111)illustrated (112)in (113)Figure (114)2, (115)where (116)it (117)is (118)possible (119)to (120)construct (121)an (122)infinite (123)sequence (124)of (125)"or" (126)operations. In (127)the (128)current (129)study, (130)we (131)leverage (132)this (133)inherent (134)flexibility (135)to (136)generate (137)mutated (138)variants (139)of (140)an (141)original (142)program. The (143)e-graph (144)offers (145)the (146)option (147)for (148)random (149)traversal, (150)allowing (151)for (152)the (153)random (154)selection (155)of (156)an (157)e-node (158)within (159)each (160)e-class (161)visited, (162)thereby (163)yielding (164)an (165)equivalent (166)expression.
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)9 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)9 (5)of (6)25
insert '' by '*https://cra'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
state.
delete 'state.' by ''
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
its
replace 'its' by '*https://crates.io/crates/wasmparser'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
collect
replace 'collect' by '*https://crates.io/crates/wasmparser'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
to
replace 'to' by '*https://crates.io/crates/wasmparser'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
variant
replace 'variant' by '*https://crates.io/crates/wasmparser'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
the
replace 'the' by '*https://crates.io/crates/wasmparser'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
execute
replace 'execute' by 'state.'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
we
replace 'we' by 'its'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
met,
replace 'met,' by 'collect'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
is
replace 'is' by 'to'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
condition
replace 'condition' by 'variant'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
this
replace 'this' by 'the'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
If
replace 'If' by 'execute'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
level.
replace 'level.' by 'we'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
code
replace 'code' by 'met,'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
machine
replace 'machine' by 'is'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
the
replace 'the' by 'condition'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
at
replace 'at' by 'this'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
diversity
replace 'diversity' by 'If'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
confirming
replace 'confirming' by 'level.'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
thus
replace 'thus' by 'code'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
original,
replace 'original,' by 'machine'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
from
replace 'from' by 'at'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
differs
replace 'differs' by 'diversity'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
code
replace 'code' by 'confirming'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
machine
replace 'machine' by 'thus'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
this
replace 'this' by 'original,'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
whether
replace 'whether' by 'the'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
checks
replace 'checks' by 'from'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
then
replace 'then' by 'differs'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
algorithm
replace 'algorithm' by 'code'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
The
replace 'The' by 'machine'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
code.
replace 'code.' by 'this'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
machine
replace 'machine' by 'whether'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
into
replace 'into' by 'checks'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
variant
replace 'variant' by 'then'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
the
replace 'the' by 'algorithm'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
compiles
replace 'compiles' by 'The'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
step
replace 'step' by 'code.'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
This
replace 'This' by 'machine'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
engine.
replace 'engine.' by 'into'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
WebAssembly
replace 'WebAssembly' by 'variant'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
within
replace 'within' by 'compiles'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
compilation
replace 'compilation' by 'step'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
JIT
replace 'JIT' by 'This'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
a
replace 'a' by 'engine.'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
triggers
replace 'triggers' by 'WebAssembly'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
11
replace '11' by 'the'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
line
replace 'line' by 'within'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
variant,
replace 'variant,' by 'compilation'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
unique
replace 'unique' by 'JIT'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
insert '' by 'triggers'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
insert '' by '11'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
insert '' by 'line'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
insert '' by 'variant,'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
insert '' by 'unique'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
insert '' by 'a'
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. The (25)algorithm (26)then (27)checks (28)whether (29)this (30)machine (31)code (32)differs (33)from (34)the (35)original, (36)thus (37)confirming (38)diversity (39)at (40)the (41)machine (42)code (43)level. If (44)this (45)condition (46)is (47)met, (48)we (49)execute (50)the (51)variant (52)to (53)collect (54)its (55)state. *https://crates.io/crates/wasmparser (56)*https://crates.io/crates/wasmparser (57)*https://crates.io/crates/wasmparser (58)*https://crates.io/crates/wasmparser (59)*https://crates.io/crates/wasmparser (60)*https://crates.io/crates/wasmparser (61)*https://cra
(0)Upon (1)successful (2)static (3)validation (4)of (5)a (6)unique (7)variant, (8)line (9)11 (10)triggers (11)a (12)JIT (13)compilation (14)within (15)the (16)WebAssembly (17)engine. This (18)step (19)compiles (20)the (21)variant (22)into (23)machine (24)code. (25)The (26)algorithm (27)then (28)checks (29)whether (30)this (31)machine (32)code (33)differs (34)from (35)the (36)original, (37)thus (38)confirming (39)diversity (40)at (41)the (42)machine (43)code (44)level. If (45)this (46)condition (47)is (48)met, (49)we (50)execute (51)the (52)variant (53)to (54)collect (55)its (56)state. (57)*https://crates.io/crates/wasmparser
~.
replace '~.' by '.'
(0)We (1)start (2)WASM-MUTATE (3)in (4)line (5)8 (6)of (7)the (8)algorithm, (9)initiating (10)the (11)loop (12)for (13)creating (14)a (15)new (16)variant. If (17)a (18)variant (19)is (20)generated (21)out (22)of (23)WASM-MUTATE (24)in (25)line (26)8, (27)static (28)validation (29)is (30)invoked (31)in (32)line (33)9. This (34)static (35)validation (36)is (37)performed (38)by (39)the (40)wasmtime (41)parser (42). The (43)static (44)validation (45)step (46)ensures (47)the (48)stack’s (49)soundness. For (50)instance, (51)the (52)static (53)validator (54)verifies (55)that (56)a (57)function (58)call (59)does (60)not (61)refer (62)to (63)a (64)non-existent (65)function (66)index. It (67)also (68)ensures (69)the (70)correctness (71)of (72)the (73)execution (74)stack, (75)i.e., (76)a (77)non-returning (78)block (79)should (80)leave (81)the (82)stack (83)in (84)the (85)same (86)state (87)as (88)before (89)execution.
(0)We (1)start (2)WASM-MUTATE (3)in (4)line (5)8 (6)of (7)the (8)algorithm, (9)initiating (10)the (11)loop (12)for (13)creating (14)a (15)new (16)variant. If (17)a (18)variant (19)is (20)generated (21)out (22)of (23)WASM-MUTATE (24)in (25)line (26)8, (27)static (28)validation (29)is (30)invoked (31)in (32)line (33)9. This (34)static (35)validation (36)is (37)performed (38)by (39)the (40)wasmtime (41)parser (42)~. The (43)static (44)validation (45)step (46)ensures (47)the (48)stack’s (49)soundness. For (50)instance, (51)the (52)static (53)validator (54)verifies (55)that (56)a (57)function (58)call (59)does (60)not (61)refer (62)to (63)a (64)non-existent (65)function (66)index. It (67)also (68)ensures (69)the (70)correctness (71)of (72)the (73)execution (74)stack, (75)i.e., (76)a (77)non-returning (78)block (79)should (80)leave (81)the (82)stack (83)in (84)the (85)same (86)state (87)as (88)before (89)execution.
can
delete 'can' by ''
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
code
delete 'code' by ''
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
WebAssembly
replace 'WebAssembly' by 'be'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
original
replace 'original' by 'can'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by 'code'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
to
replace 'to' by 'WebAssembly'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
applied
replace 'applied' by 'original'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
result
replace 'result' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
traversal
replace 'traversal' by 'to'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
The
replace 'The' by 'applied'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
1
replace '1' by 'result'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
0)i64.const
replace '0)i64.const' by 'traversal'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.const
replace 'i64.const' by 'The'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.const
delete 'i64.const' by ''
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
(i64.add
delete '(i64.add' by ''
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.or
replace 'i64.or' by '0)i64.const'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
=
replace '=' by 'i64.const'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
expr
replace 'expr' by '1'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
returning:
replace 'returning:' by 'i64.const'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
e-node,
replace 'e-node,' by '(i64.add'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
instruction
replace 'instruction' by 'i64.or'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
initial
replace 'initial' by '='
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by 'expr'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
to
replace 'to' by 'returning:'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
corresponding
replace 'corresponding' by 'e-node,'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
selected,
replace 'selected,' by 'instruction'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
is
replace 'is' by 'initial'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
or
replace 'or' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.
replace 'i64.' by 'to'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by 'corresponding'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
of
replace 'of' by 'selected,'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
operand
replace 'operand' by 'is'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
right
replace 'right' by 'or'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by 'i64.'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
(8),
replace '(8),' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
step
replace 'step' by 'of'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
final
replace 'final' by 'operand'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by 'right'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
In
replace 'In' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
r.
replace 'r.' by '(8),'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
@)
replace '@)' by 'step'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.const
replace 'i64.const' by 'final'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
1
replace '1' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.const
replace 'i64.const' by 'In'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
(i64.add
replace '(i64.add' by 'r.'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.or
replace 'i64.or' by '@)'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
=
replace '=' by 'i64.const'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
expr
replace 'expr' by '1'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
@:
replace '@:' by 'i64.const'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
(6)
replace '(6)' by '(i64.add'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
selected
replace 'selected' by 'i64.or'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
1s
replace '1s' by '='
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
@
replace '@' by 'expr'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.const
replace 'i64.const' by '@:'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
node
replace 'node' by '(6)'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by 'selected'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
where
replace 'where' by '1s'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
e-class,
replace 'e-class,' by '@'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
another
replace 'another' by 'i64.const'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
to
replace 'to' by 'node'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
belongs
replace 'belongs' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
node
replace 'node' by 'where'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
add
replace 'add' by 'e-class,'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.
replace 'i64.' by 'another'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by 'to'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
of
replace 'of' by 'belongs'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
operand
replace 'operand' by 'node'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
right
replace 'right' by 'Add'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
The
replace 'The' by 'i64.'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
r.
replace 'r.' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
r)
replace 'r)' by 'of'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
1
replace '1' by 'operation'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.const
replace 'i64.const' by 'right'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
(i64.add
replace '(i64.add' by 'The'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.0r
replace 'i64.0r' by 'r.'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
=
replace '=' by 'r)'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
expr
replace 'expr' by '1'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
6):
replace '6):' by 'i64.const'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
node
replace 'node' by '(i64.add'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
original
replace 'original' by 'i64.0r'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by '='
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
is
replace 'is' by 'expr'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
node
replace 'node' by '6):'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i¢4.add
replace 'i¢4.add' by 'node'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by 'original'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
of
replace 'of' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
operand
replace 'operand' by 'is'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
left
replace 'left' by 'node'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
The
replace 'The' by 'i4.add'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
r.
replace 'r.' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
1
replace '1' by 'operand'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
(i64.add
replace '(i64.add' by 'left'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.or
replace 'i64.or' by 'The'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
=
replace '=' by 'r.'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
expr
replace 'expr' by 'r)'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
e-class:
replace 'e-class:' by '1'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by '(i64.add'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
within
replace 'within' by 'i64.or'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
node
replace 'node' by '='
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.add
replace 'i64.add' by 'expr'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by 'e-class:'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
choosing
replace 'choosing' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
GB),
replace 'GB),' by 'within'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
selected
replace 'selected' by 'i64.add'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
of
delete 'of' by ''
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
operand
replace 'operand' by 'choosing'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
left
replace 'left' by 'GB),'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by 'node'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
with
replace 'with' by 'selected'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
proceeds
replace 'proceeds' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
traversal
replace 'traversal' by 'of'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
The
replace 'The' by 'operand'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
r.
replace 'r.' by 'left'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
1
replace '1' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
i64.or
replace 'i64.or' by 'with'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
=
replace '=' by 'proceeds'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
expr
replace 'expr' by 'traversal'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
in:
replace 'in:' by 'The'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
resulting
replace 'resulting' by 'r.'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
node,
replace 'node,' by '1'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by '='
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
case,
replace 'case,' by 'expr'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
this
replace 'this' by 'in:'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
in
replace 'in' by 'resulting'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
(2),
replace '(2),' by 'node,'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
e-class
replace 'e-class' by 'i64.or'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
insert '' by 'case,'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
insert '' by 'this'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
insert '' by '(2),'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
node
replace 'node' by 'e-class'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
equivalent
replace 'equivalent' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
an
replace 'an' by 'in'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
selects
replace 'selects' by 'node'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
then
replace 'then' by 'equivalent'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
It
replace 'It' by 'an'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
3.
replace '3.' by 'selects'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
Listing
replace 'Listing' by 'then'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
from
replace 'from' by 'It'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
1
replace '1' by '3.'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
ié4.const
replace 'ié4.const' by 'Listing'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
instruction
replace 'instruction' by 'from'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
single
replace 'single' by '1'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
the
replace 'the' by 'ié4.const'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
containing
replace 'containing' by 'instruction'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
e-class
replace 'e-class' by 'single'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
insert '' by 'containing'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
insert '' by 'e-class'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
insert '' by 'the'
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operation (98)of (99)the (100)i64. Add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)be (163)observed (164)in (165)Listing (166)4.
(0)In (1)Figure (2)3, (3)we (4)annotate (5)the (6)various (7)steps (8)of (9)Algorithm (10)1 (11)for (12)the (13)scenario (14)described (15)above. Algorithm (16)| (17)begins (18)at (19)the (20)e-class (21)containing (22)the (23)single (24)instruction (25)ié4.const (26)1 (27)from (28)Listing (29)3. It (30)then (31)selects (32)an (33)equivalent (34)node (35)in (36)the (37)e-class (38)(2), (39)in (40)this (41)case, (42)the (43)i64.or (44)node, (45)resulting (46)in: (47)expr (48)= (49)i64.or (50)1 (51)r. The (52)traversal (53)proceeds (54)with (55)the (56)left (57)operand (58)of (59)the (60)selected (61)node (62)GB), (63)choosing (64)the (65)i64.add (66)node (67)within (68)the (69)e-class: (70)expr (71)= (72)i64.or (73)(i64.add (74)1 (75)r) (76)r. The (77)left (78)operand (79)of (80)the (81)i¢4.add (82)node (83)is (84)the (85)original (86)node (87)6): (88)expr (89)= (90)i64.0r (91)(i64.add (92)i64.const (93)1 (94)r) (95)r. The (96)right (97)operand (98)of (99)the (100)i64. add (101)node (102)belongs (103)to (104)another (105)e-class, (106)where (107)the (108)node (109)i64.const (110)@ (111)1s (112)selected (113)(6) (114)@: (115)expr (116)= (117)i64.or (118)(i64.add (119)i64.const (120)1 (121)i64.const (122)@) (123)r. In (124)the (125)final (126)step (127)(8), (128)the (129)right (130)operand (131)of (132)the (133)i64. or (134)is (135)selected, (136)corresponding (137)to (138)the (139)initial (140)instruction (141)e-node, (142)returning: (143)expr (144)= (145)i64.or (146)(i64.add (147)i64.const (148)1 (149)i64.const (150)0)i64.const (151)1 (152)The (153)traversal (154)result (155)applied (156)to (157)the (158)original (159)WebAssembly (160)code (161)can (162)observed (163)in (164)Listing (165)4.
loop
replace 'loop' by 'loop.'
(0)3.4. WASM-MUTATE (1)in (2)the (3)loop.
(0)3.4. WASM-MUTATE (1)in (2)the (3)loop
insert '' by 'list.'
(0)If (1)AU (2)(3) (3)64. Const (4)1] (5)Const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. Add (14)to (15)the (16)list.
(0)if (1)AU (2)(3) (3)64. const (4)1] (5)const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. add
insert '' by 'the'
(0)If (1)AU (2)(3) (3)64. Const (4)1] (5)Const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. Add (14)to (15)the (16)list.
(0)if (1)AU (2)(3) (3)64. const (4)1] (5)const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. add
insert '' by 'to'
(0)If (1)AU (2)(3) (3)64. Const (4)1] (5)Const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. Add (14)to (15)the (16)list.
(0)if (1)AU (2)(3) (3)64. const (4)1] (5)const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. add
add
replace 'add' by 'Add'
(0)If (1)AU (2)(3) (3)64. Const (4)1] (5)Const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. Add (14)to (15)the (16)list.
(0)if (1)AU (2)(3) (3)64. const (4)1] (5)const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. add
const
replace 'const' by 'Const'
(0)If (1)AU (2)(3) (3)64. Const (4)1] (5)Const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. Add (14)to (15)the (16)list.
(0)if (1)AU (2)(3) (3)64. const (4)1] (5)const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. add
if
replace 'if' by 'If'
(0)If (1)AU (2)(3) (3)64. Const (4)1] (5)Const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. Add (14)to (15)the (16)list.
(0)if (1)AU (2)(3) (3)64. const (4)1] (5)const (6)1 (7)e-class (8)— (9)ay (10)i64.const (11)0 (12)i64.or (13)164. add
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)10 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)10 (5)of (6)25
approximately,
replace 'approximately,' by 'approximately'
(0)WASM-MUTATE (1)is (2)implemented (3)in (4)Rust, (5)comprising (6)approximately (7)10000 (8)lines (9)of (10)Rust (11)code. We (12)leverage (13)the (14)capabilities (15)of (16)the (17)wasm-tools (18)project (19)of (20)the (21)bytecode (22)alliance (23)for (24)parsing (25)and (26)transforming (27)WebAssembly (28)binary (29)code. Specifically, (30)we (31)use (32)the (33)wasmparser, (34)https://github.com/bytecodealliance/wasm-tools/ (35)tree/main/crates/wasmparser (36)and (37)wasm-encoder, (38)https://github.com/bytecodealliance/wasm-tools/tree/ (39)main/crates/wasm-encoder (40)modules (41)for (42)parsing (43)and (44)encoding (45)WebAssembly (46)binaries, (47)respectively. The (48)wasmparser (49)crate (50)provides (51)quick, (52)efficient (53)decoding (54)and (55)parsing (56)of (57)WebAssembly (58)binary (59)files. Its (60)primary (61)advantage (62)is (63)a (64)minimal (65)memory (66)footprint, (67)achieved (68)without (69)creating (70)AST (71)or (72)IR (73)of (74)WebAssembly (75)data. Conversely, (76)the (77)wasm-encoder (78)crate (79)is (80)a (81)reliable (82)library (83)for (84)encoding (85)Wasm (86)binaries. Additionally, (87)the (88)wasm-encoder (89)crate (90)offers (91)static (92)validation (93)of (94)the (95)constructed (96)binary, (97)ensuring (98)the (99)integrity (100)of (101)a (102)newly (103)encoded (104)Wasm (105)binary. The (106)implementation (107)of (108)WASM-MUTATE (109)is (110)publicly (111)available (112)for (113)future (114)research (115)and (116)can (117)be (118)found (119)at (120)https://github.com/bytecodealliance/ (121)wasm-tools/tree/main/crates/wasm-mutate.
(0)WASM-MUTATE (1)is (2)implemented (3)in (4)Rust, (5)comprising (6)approximately, (7)10000 (8)lines (9)of (10)Rust (11)code. We (12)leverage (13)the (14)capabilities (15)of (16)the (17)wasm-tools (18)project (19)of (20)the (21)bytecode (22)alliance (23)for (24)parsing (25)and (26)transforming (27)WebAssembly (28)binary (29)code. Specifically, (30)we (31)use (32)the (33)wasmparser, (34)https://github.com/bytecodealliance/wasm-tools/ (35)tree/main/crates/wasmparser (36)and (37)wasm-encoder, (38)https://github.com/bytecodealliance/wasm-tools/tree/ (39)main/crates/wasm-encoder (40)modules (41)for (42)parsing (43)and (44)encoding (45)WebAssembly (46)binaries, (47)respectively. The (48)wasmparser (49)crate (50)provides (51)quick, (52)efficient (53)decoding (54)and (55)parsing (56)of (57)WebAssembly (58)binary (59)files. Its (60)primary (61)advantage (62)is (63)a (64)minimal (65)memory (66)footprint, (67)achieved (68)without (69)creating (70)AST (71)or (72)IR (73)of (74)WebAssembly (75)data. Conversely, (76)the (77)wasm-encoder (78)crate (79)is (80)a (81)reliable (82)library (83)for (84)encoding (85)Wasm (86)binaries. Additionally, (87)the (88)wasm-encoder (89)crate (90)offers (91)static (92)validation (93)of (94)the (95)constructed (96)binary, (97)ensuring (98)the (99)integrity (100)of (101)a (102)newly (103)encoded (104)Wasm (105)binary. The (106)implementation (107)of (108)WASM-MUTATE (109)is (110)publicly (111)available (112)for (113)future (114)research (115)and (116)can (117)be (118)found (119)at (120)https://github.com/bytecodealliance/ (121)wasm-tools/tree/main/crates/wasm-mutate.
insert '' by 'state.'
(0)Then, (1)the (2)variant’s (3)state (4)is (5)compared (6)to (7)the (8)original (9)state (10)for (11)dynamic (12)validation. This (13)process (14)is (15)demonstrated (16)in (17)line (18)14. We (19)perform (20)a (21)fine-grained (22)comparison (23)of (24)the (25)variant’s (26)globals, (27)linear (28)memory, (29)and (30)output (31)according (32)to (33)a (34)validation (35)workload. For (36)example, (37)the (38)variant (39)and (40)the (41)original (42)are (43)considered (44)identical (45)for (46)the (47)linear (48)memory (49)if (50)all (51)bytes (52)are (53)equal (54)and (55)in (56)the (57)same (58)order. If (59)there (60)is (61)any (62)difference (63)in (64)these (65)state (66)components, (67)the (68)variant (69)is (70)discarded (71)because (72)it (73)is (74)not (75)equivalent (76)to (77)the (78)oriuginal (79)state.
(0)Then, (1)the (2)variant’s (3)state (4)is (5)compared (6)to (7)the (8)original (9)state (10)for (11)dynamic (12)validation. This (13)process (14)is (15)demonstrated (16)in (17)line (18)14. We (19)perform (20)a (21)fine-grained (22)comparison (23)of (24)the (25)variant’s (26)globals, (27)linear (28)memory, (29)and (30)output (31)according (32)to (33)a (34)validation (35)workload. For (36)example, (37)the (38)variant (39)and (40)the (41)original (42)are (43)considered (44)identical (45)for (46)the (47)linear (48)memory (49)if (50)all (51)bytes (52)are (53)equal (54)and (55)in (56)the (57)same (58)order. If (59)there (60)is (61)any (62)difference (63)in (64)these (65)state (66)components, (67)the (68)variant (69)is (70)discarded (71)because (72)it (73)is (74)not (75)equivalent (76)to (77)the (78)oriugina
oriugina
replace 'oriugina' by 'oriuginal'
(0)Then, (1)the (2)variant’s (3)state (4)is (5)compared (6)to (7)the (8)original (9)state (10)for (11)dynamic (12)validation. This (13)process (14)is (15)demonstrated (16)in (17)line (18)14. We (19)perform (20)a (21)fine-grained (22)comparison (23)of (24)the (25)variant’s (26)globals, (27)linear (28)memory, (29)and (30)output (31)according (32)to (33)a (34)validation (35)workload. For (36)example, (37)the (38)variant (39)and (40)the (41)original (42)are (43)considered (44)identical (45)for (46)the (47)linear (48)memory (49)if (50)all (51)bytes (52)are (53)equal (54)and (55)in (56)the (57)same (58)order. If (59)there (60)is (61)any (62)difference (63)in (64)these (65)state (66)components, (67)the (68)variant (69)is (70)discarded (71)because (72)it (73)is (74)not (75)equivalent (76)to (77)the (78)oriuginal (79)state.
(0)Then, (1)the (2)variant’s (3)state (4)is (5)compared (6)to (7)the (8)original (9)state (10)for (11)dynamic (12)validation. This (13)process (14)is (15)demonstrated (16)in (17)line (18)14. We (19)perform (20)a (21)fine-grained (22)comparison (23)of (24)the (25)variant’s (26)globals, (27)linear (28)memory, (29)and (30)output (31)according (32)to (33)a (34)validation (35)workload. For (36)example, (37)the (38)variant (39)and (40)the (41)original (42)are (43)considered (44)identical (45)for (46)the (47)linear (48)memory (49)if (50)all (51)bytes (52)are (53)equal (54)and (55)in (56)the (57)same (58)order. If (59)there (60)is (61)any (62)difference (63)in (64)these (65)state (66)components, (67)the (68)variant (69)is (70)discarded (71)because (72)it (73)is (74)not (75)equivalent (76)to (77)the (78)oriugina
Implementation
replace 'Implementation' by 'Implementation.'
(0)3.5. Implementation.
(0)3.5. Implementation
transformation
delete 'transformation' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
the
delete 'the' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
stack
delete 'stack' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
we
delete 'we' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
//
delete '//' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
asm
delete 'asm' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
variantW
delete 'variantW' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
<=
delete '<=' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
wasm
delete 'wasm' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
19:
delete '19:' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
return
delete 'return' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
18:
delete '18:' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
then
delete 'then' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
State.trace
delete 'State.trace' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
original
delete 'original' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
#
delete '#' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
state.trace
delete 'state.trace' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
if
delete 'if' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
i
delete 'i' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
then
delete 'then' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
State.output
delete 'State.output' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
original
delete 'original' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
==
delete '==' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
state.output
delete 'state.output' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
16:
delete '16:' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
&&
delete '&&' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
State.globals
delete 'State.globals' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
state.globals
delete 'state.globals' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
15:
delete '15:' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
State.memory
delete 'State.memory' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
state.memory
delete 'state.memory' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
if
delete 'if' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
14:
delete '14:' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
IT)
delete 'IT)' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
engine.execute(variantJ
delete 'engine.execute(variantJ' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
—
delete '—' by ''
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
state
replace 'state' by 'engine.execute'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
13:
replace '13:' by '—'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
then
replace 'then' by 'state'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
unique
replace 'unique' by '13:'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
is
replace 'is' by 'then'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
IT
replace 'IT' by 'unique'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
variantJ
replace 'variantJ' by 'is'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
if
replace 'if' by 'IT'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
12:
replace '12:' by 'variantJ'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
asm)
replace 'asm)' by 'if'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
engine.compile(variantW
replace 'engine.compile(variantW' by '12:'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
<—
replace '<—' by 'asm)'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
IT
replace 'IT' by 'engine.compile(variantW'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
variantJ
replace 'variantJ' by '—'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
113
replace '113' by 'IT'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
then
replace 'then' by 'variantJ'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
unique
replace 'unique' by '113'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
asm
replace 'asm' by 'unique'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
variantW
replace 'variantW' by 'is'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
if
replace 'if' by 'asm'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
10:
replace '10:' by 'variantW'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
then
replace 'then' by 'if'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
asm)
replace 'asm)' by '10:'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
Validate(variantW
replace 'Validate(variantW' by 'then'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
static
replace 'static' by 'asm)'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
if
replace 'if' by 'Validate(variantW'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
WASM-MUTATE(wasm)
replace 'WASM-MUTATE(wasm)' by 'static'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
—
replace '—' by 'if'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
asm
replace 'asm' by 'WASM-MUTATE(wasm)'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
variantW
replace 'variantW' by '—'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
do
replace 'do' by 'asm'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
true
replace 'true' by 'variantW'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
while
replace 'while' by 'do'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
originalWasm
replace 'originalWasm' by 'true'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
<
replace '<' by 'while'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
wasm
replace 'wasm' by 'originalWasm'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
9
replace '9' by 'wasm'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
8
replace '8' by '9'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
7
replace '7' by '8'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
6
replace '6' by '7'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
asm)
replace 'asm)' by '6'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
engine.execute(originalW
replace 'engine.execute(originalW' by 'asm)'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
—
replace '—' by 'engine.execute(originalW'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
State
replace 'State' by '—'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
original
replace 'original' by 'State'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
5
replace '5' by 'original'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
4
replace '4' by '5'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
3
replace '3' by '4'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
Z
replace 'Z' by '3'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
1
replace '1' by 'Z'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
variant.
replace 'variant.' by '1'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
WebAssembly
replace 'WebAssembly' by 'variant.'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
different
replace 'different' by 'WebAssembly'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
behaviourally
replace 'behaviourally' by 'different'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
and
replace 'and' by 'behaviourally'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
unique
replace 'unique' by 'and'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
statically
replace 'statically' by 'unique'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
A
replace 'A' by 'statically'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
>
replace '>' by 'A'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
Output:
replace 'Output:' by '>'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
:
replace ':' by 'Output:'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
:
replace ':' by 'The'
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. The (6)procedure (7)DIVERSIFY (8)(originalW (9)asm, (10)engine (11): (12)Input: (13)> (14)A (15)WebAssembly (16)binary (17)to (18)diversify (19)and (20)a (21)WebAssembly (22)engine. Output: (23)> (24)A (25)statically (26)unique (27)and (28)behaviourally (29)different (30)WebAssembly (31)variant. 1 (32)Z (33)3 (34)4 (35)5 (36)original (37)State (38)— (39)engine.execute(originalW (40)asm) (41)6 (42)7 (43)8 (44)9 (45)wasm (46) (47)originalWasm (48)while (49)true (50)do (51)variantW (52)asm (53)— (54)WASM-MUTATE(wasm) (55)if (56)static (57)Validate(variantW (58)asm) (59)then (60)10: (61)if (62)variantW (63)asm (64)is (65)unique (66)then (67)113 (68)variantJ (69)IT (70)— (71)engine.compile(variantW (72)asm) (73)12: (74)if (75)variantJ (76)IT (77)is (78)unique (79)then (80)13: (81)state (82)— (83)engine.execute
(0)Algorithm (1)2 (2)WASM-MUTATE (3)in (4)the (5)loop. (6): (7)procedure (8)DIVERSIFY (9)(originalW (10)asm, (11)engine (12): (13)Input: (14)> (15)A (16)WebAssembly (17)binary (18)to (19)diversify (20)and (21)a (22)WebAssembly (23)engine. (24): (25)Output: (26)> (27)A (28)statically (29)unique (30)and (31)behaviourally (32)different (33)WebAssembly (34)variant. (35)1 (36)Z (37)3 (38)4 (39)5 (40)original (41)State (42)— (43)engine.execute(originalW (44)asm) (45)6 (46)7 (47)8 (48)9 (49)wasm (50)< (51)originalWasm (52)while (53)true (54)do (55)variantW (56)asm (57)— (58)WASM-MUTATE(wasm) (59)if (60)static (61)Validate(variantW (62)asm) (63)then (64)10: (65)if (66)variantW (67)asm (68)is (69)unique (70)then (71)113 (72)variantJ (73)IT (74)<— (75)engine.compile(variantW (76)asm) (77)12: (78)if (79)variantJ (80)IT (81)is (82)unique (83)then (84)13: (85)state (86)— (87)engine.execute(variantJ (88)IT) (89)14: (90)if (91)state.memory (92)== (93)original (94)State.memory (95)&& (96)15: (97)state.globals (98)== (99)original (100)State.globals (101)&& (102)16: (103)state.output (104)== (105)original (106)State.output (107)then (108)i (109)if (110)state.trace (111)# (112)original (113)State.trace (114)then (115)18: (116)return (117)variantW (118)asm (119)19: (120)wasm (121)<= (122)variantW (123)asm (124)// (125)we (126)stack (127)the (128)transformation
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)11 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)11 (5)of (6)25
question
delete 'question' by ''
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
research
replace 'research' by 'question,'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
this
replace 'this' by 'research'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
In
replace 'In' by 'this'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
issues.
replace 'issues.' by 'In'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
security
replace 'security' by 'issues.'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
prevent
replace 'prevent' by 'security'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
to
replace 'to' by 'prevent'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
option
replace 'option' by 'to'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
an
replace 'an' by 'option'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
is
replace 'is' by 'an'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
Diversification
replace 'Diversification' by 'is'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
Soft-ware
replace 'Soft-ware' by 'diversification'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
programs?
replace 'programs?' by 'Soft-ware'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
WebAssembly
replace 'WebAssembly' by 'programs?'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
on
replace 'on' by 'WebAssembly'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
attacks
replace 'attacks' by 'on'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
side-channel
replace 'side-channel' by 'attacks'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
prevent
replace 'prevent' by 'side-channel'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
WASM-MUTATE
replace 'WASM-MUTATE' by 'prevent'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
does
replace 'does' by 'WASM-MUTATE'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
extent
replace 'extent' by 'does'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
what
replace 'what' by 'extent'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
To
replace 'To' by 'what'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
RQ4:
replace 'RQ4:' by 'To'
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)prevent (6)side-channel (7)attacks (8)on (9)WebAssembly (10)programs? (11)Soft-ware (12)diversification (13)is (14)an (15)option (16)to (17)prevent (18)security (19)issues. In (20)this (21)research (22)question, (23)we (24)assess (25)the (26)impact (27)of (28)WASM-MUTATE (29)in (30)preventing (31)one (32)class (33)of (34)attacks: (35)cache (36)timing (37)attacks (38)(Spectre).
(0)RQ4: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)prevent (7)side-channel (8)attacks (9)on (10)WebAssembly (11)programs? (12)Soft-ware (13)Diversification (14)is (15)an (16)option (17)to (18)prevent (19)security (20)issues. In (21)this (22)research (23)question (24)we (25)assess (26)the (27)impact (28)of (29)WASM-MUTATE (30)in (31)preventing (32)one (33)class (34)of (35)attacks: (36)cache (37)timing (38)attacks (39)(Spectre).
RQ3:
delete 'RQ3:' by ''
(0)To (1)what (2)extent (3)does (4)WASM-MUTATE (5)affect (6)the (7)performance (8)of (9)real-world (10)WebAssembly (11)program (12)variants? (13)This (14)research (15)question (16)evaluates (17)the (18)performance (19)impact (20)of (21)WASM-MUTATE (22)in (23)creating (24)variants (25)from (26)real-world (27)programs. We (28)compare (29)the (30)machine (31)code (32)size (33)and (34)the (35)execution (36)time (37)of (38)the (39)original (40)programs (41)and (42)their (43)variants.
(0)RQ3: (1)To (2)what (3)extent (4)does (5)WASM-MUTATE (6)affect (7)the (8)performance (9)of (10)real-world (11)WebAssembly (12)program (13)variants? (14)This (15)research (16)question (17)evaluates (18)the (19)performance (20)impact (21)of (22)WASM-MUTATE (23)in (24)creating (25)variants (26)from (27)real-world (28)programs. We (29)compare (30)the (31)machine (32)code (33)size (34)and (35)the (36)execution (37)time (38)of (39)the (40)original (41)programs (42)and (43)their (44)variants.
functions
replace 'functions' by 'function'
(0)We (1)answer (2)RQI (3)and (4)RQ? (5)with (6)a (7)corpus (8)of (9)programs (10)from (11)Cabrera (12)et.al. [1], (13)which (14)is (15)shown (16)in (17)the (18)first (19)row (20)of (21)Table (22)1. The (23)corpus (24)contains (25)303 (26)programs. The (27)programs (28)in (29)the (30)corpus (31)perform (32)a (33)range (34)of (35)tasks, (36)from (37)simple (38)ones, (39)such (40)as (41)sorting, (42)to (43)complex (44)algorithms (45)like (46)a (47)compiler (48)lexer. The (49)number (50)of (51)total (52)instructions (53)ranges (54)from (55)170 (56)to (57)36023 (58)with (59)a (60)mean (61)of (62)8451 (63)instructions. All (64)programs (65)in (66)the (67)corpus: (68)1) (69)do (70)not (71)require (72)input (73)from (74)users, (75)i.e., (76)do (77)not (78)function (79)like (80)scanf, (81)2) (82)terminate, (83)3) (84)are (85)deterministic, (86)i.e., (87)given (88)the (89)same (90)input, (91)provide (92)the (93)same (94)output (95)and (96)4) (97)compile (98)to (99)WebAssembly (100)using (101)wasi-clang (102)to (103)compile (104)them. The (105)size (106)of (107)the (108)binaries (109)ranges (110)from (111)465 (112)to (113)92114 (114)bytes.
(0)We (1)answer (2)RQI (3)and (4)RQ? (5)with (6)a (7)corpus (8)of (9)programs (10)from (11)Cabrera (12)et.al. [1], (13)which (14)is (15)shown (16)in (17)the (18)first (19)row (20)of (21)Table (22)1. The (23)corpus (24)contains (25)303 (26)programs. The (27)programs (28)in (29)the (30)corpus (31)perform (32)a (33)range (34)of (35)tasks, (36)from (37)simple (38)ones, (39)such (40)as (41)sorting, (42)to (43)complex (44)algorithms (45)like (46)a (47)compiler (48)lexer. The (49)number (50)of (51)total (52)instructions (53)ranges (54)from (55)170 (56)to (57)36023 (58)with (59)a (60)mean (61)of (62)8451 (63)instructions. All (64)programs (65)in (66)the (67)corpus: (68)1) (69)do (70)not (71)require (72)input (73)from (74)users, (75)i.e., (76)do (77)not (78)functions (79)like (80)scanf, (81)2) (82)terminate, (83)3) (84)are (85)deterministic, (86)i.e., (87)given (88)the (89)same (90)input, (91)provide (92)the (93)same (94)output (95)and (96)4) (97)compile (98)to (99)WebAssembly (100)using (101)wasi-clang (102)to (103)compile (104)them. (105)The (106)size (107)of (108)the (109)binaries (110)ranges (111)from (112)465 (113)to (114)92114 (115)bytes.
contains
You should probably use “contain”.
We use a collection of programs comprised of four curated corpora to address our research questions. Our corpora contains a total of 441 programs (303 + 134 + 2 + 2). The metadata of these programs is summarized in Table 1. Each row in the table corresponds to the programs in use for each research question. The columns provide information on the following: the corpus source, the number of programs, the research question addressed, and the mean number of instructions for the programs. Additionally, a short note highlights the main property of the programs in the last column. For instance, the notes in the last two rows indicate the attacks to which the programs are susceptible.
insert '' by 'Corpor'
(0)4.1. Corpora (1)Corpora (2)Corpora (3)Corpora (4)Corpora (5)Corpora (6)Corpora (7)Corpora (8)Corpora (9)Corpora (10)Corpora (11)Corpora (12)Corpora (13)Corpora (14)Corpora (15)Corpora (16)Corpora (17)Corpora (18)Corpora (19)Corpora (20)Corpora (21)Corpora (22)Corpora (23)Corpora (24)Corpora (25)Corpora (26)Corpora (27)Corpora (28)Corpora (29)Corpora (30)Corpora (31)Corpora (32)Corpora (33)Corpora (34)Corpora (35)Corpora (36)Corpora (37)Corpor
(0)4.1. Corpora
insert '' by 'Corpora'
(0)4.1. Corpora (1)Corpora (2)Corpora (3)Corpora (4)Corpora (5)Corpora (6)Corpora (7)Corpora (8)Corpora (9)Corpora (10)Corpora (11)Corpora (12)Corpora (13)Corpora (14)Corpora (15)Corpora (16)Corpora (17)Corpora (18)Corpora (19)Corpora (20)Corpora (21)Corpora (22)Corpora (23)Corpora (24)Corpora (25)Corpora (26)Corpora (27)Corpora (28)Corpora (29)Corpora (30)Corpora (31)Corpora (32)Corpora (33)Corpora (34)Corpora (35)Corpora (36)Corpora (37)Corpor
(0)4.1. Corpora
RQ1:
delete 'RQ1:' by ''
(0)To (1)what (2)extent (3)are (4)the (5)program (6)variants (7)generated (8)by (9)WASM-MUTATE (10)statically (11)different (12)from (13)the (14)original (15)programs? (16)We (17)check (18)whether (19)the (20)Web-Assembly (21)binary (22)variants (23)rapidly (24)produced (25)by (26)WASM-MUTATE (27)are (28)different (29)from (30)the (31)original (32)WebAssembly (33)binary. Then, (34)we (35)assess (36)whether (37)the (38)x86 (39)machine (40)code (41)produced (42)by (43)the (44)wasmtime (45)engine (46)is (47)also (48)different.
(0)RQ1: (1)To (2)what (3)extent (4)are (5)the (6)program (7)variants (8)generated (9)by (10)WASM-MUTATE (11)statically (12)different (13)from (14)the (15)original (16)programs? (17)We (18)check (19)whether (20)the (21)Web-Assembly (22)binary (23)variants (24)rapidly (25)produced (26)by (27)WASM-MUTATE (28)are (29)different (30)from (31)the (32)original (33)WebAssembly (34)binary. Then, (35)we (36)assess (37)whether (38)the (39)x86 (40)machine (41)code (42)produced (43)by (44)the (45)wasmtime (46)engine (47)is (48)also (49)different.
F4s-v2(Skylake)
replace 'F4s-v2(Skylake)' by '(Skylake)'
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
Standard
replace 'Standard' by 'F4s-v2'
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
in
replace 'in' by 'Standard'
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
conducted
replace 'conducted' by 'in'
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
are
replace 'are' by 'conducted'
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
experiments
replace 'experiments' by 'are'
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
Our
replace 'Our' by 'experiments'
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
tawasco.
replace 'tawasco.' by 'Our'
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
https://github.com/ASSERT-KTH/
replace 'https://github.com/ASSERT-KTH/' by 'https://github.com/ASSERT-KTH/tawasco.'
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
evalu-ating
replace 'evalu-ating' by 'evaluating'
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evaluating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/tawasco. Our (51)experiments (52)are (53)conducted (54)in (55)Standard (56)F4s-v2 (57)(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
(0)In (1)this (2)section, (3)we (4)outline (5)our (6)methodology (7)for (8)evalu-ating (9)WASM-MUTATE. Initially, (10)we (11)introduce (12)our (13)research (14)questions (15)and (16)the (17)corpora (18)of (19)programs (20)that (21)we (22)use (23)for (24)the (25)assessment (26)of (27)WASM-MUTATE. Next, (28)we (29)elaborate (30)on (31)the (32)methodology (33)for (34)each (35)research (36)question. For (37)the (38)sake (39)of (40)reproducibility, (41)our (42)data (43)and (44)experimenting (45)pipeline (46)are (47)publicly (48)available (49)at (50)https://github.com/ASSERT-KTH/ (51)tawasco. Our (52)experiments (53)are (54)conducted (55)in (56)Standard (57)F4s-v2(Skylake) (58)Azure (59)machines (60)with (61)4 (62)virtual (63)CPUs (64)and (65)8GiB (66)memory (67)per (68)instance.
8GiB
Insert a space between the numerical value and the unit symbol.
In this section, we outline our methodology for evalu-ating WASM-MUTATE. Initially, we introduce our research questions and the corpora of programs that we use for the assessment of WASM-MUTATE. Next, we elaborate on the methodology for each research question. For the sake of reproducibility, our data and experimenting pipeline are publicly available at https://github.com/ASSERT-KTH/ tawasco. Our experiments are conducted in Standard F4s-v2(Skylake) Azure machines with 4 virtual CPUs and 8GiB memory per instance.
Evaluation
replace 'Evaluation' by 'Evaluation.'
(0)4. Evaluation.
(0)4. Evaluation
PHT
replace 'PHT' by 'PHT.'
(0)Source (1)Programs (2)| (3)RQ (4)Mean (5)# (6)Ins. Note (7)CROW (8)[1] (9)| (10)303 (11)prog. | (12)RQ1, (13)8451 (14)Rosetta (15)RQ2 (16)wasmbench (17)| (18)134 (19)prog. | (20)RQ3 (21)12665 (22)Real (23)world (24)[25] (25)Swivel (26)[38] (27)| (28)2 (29)prog. RQ4 (30)297;743 (31)Spectre (32)BTB (33)Safeside (34)2 (35)prog. RQ4 (36)378894;379058 (37)| (38)Spectre (39)RSB (40)[38, (41)22] (42)& (43)Spectre (44)PHT.
(0)Source (1)Programs (2)| (3)RQ (4)Mean (5)# (6)Ins. Note (7)CROW (8)[1] (9)| (10)303 (11)prog. | (12)RQ1, (13)8451 (14)Rosetta (15)RQ2 (16)wasmbench (17)| (18)134 (19)prog. | (20)RQ3 (21)12665 (22)Real (23)world (24)[25] (25)Swivel (26)[38] (27)| (28)2 (29)prog. RQ4 (30)297;743 (31)Spectre (32)BTB (33)Safeside (34)2 (35)prog. RQ4 (36)378894;379058 (37)| (38)Spectre (39)RSB (40)[38, (41)22] (42)& (43)Spectre (44)PHT
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)12 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)12 (5)of (6)25
V
replace 'V' by 'V.'
(0)| (1)set( (2)sha256(v),...sha256(v (3)y))| (4)Vo; (5)€ (6)V.
(0)| (1)set({ (2)sha256(v}),...sha256(v (3)y)})| (4)Vo; (5)€ (6)V
y)})|
replace 'y)})|' by 'y))|'
(0)| (1)set( (2)sha256(v),...sha256(v (3)y))| (4)Vo; (5)€ (6)V.
(0)| (1)set({ (2)sha256(v}),...sha256(v (3)y)})| (4)Vo; (5)€ (6)V
sha256(v}),...sha256(v
replace 'sha256(v}),...sha256(v' by 'sha256(v),...sha256(v'
(0)| (1)set( (2)sha256(v),...sha256(v (3)y))| (4)Vo; (5)€ (6)V.
(0)| (1)set({ (2)sha256(v}),...sha256(v (3)y)})| (4)Vo; (5)€ (6)V
set({
replace 'set({' by 'set('
(0)| (1)set( (2)sha256(v),...sha256(v (3)y))| (4)Vo; (5)€ (6)V.
(0)| (1)set({ (2)sha256(v}),...sha256(v (3)y)})| (4)Vo; (5)€ (6)V
{vj,U9,...,Uy}
delete '{vj,U9,...,Uy}' by ''
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
=
replace '=' by 'vj,U9,...,Uy'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
V
replace 'V' by '='
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
programs
replace 'programs' by 'V'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
WebAssembly
replace 'WebAssembly' by 'programs'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
of
replace 'of' by 'WebAssembly'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
corpus
replace 'corpus' by 'of'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
generated
replace 'generated' by 'corpus'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
a
replace 'a' by 'generated'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
P,
replace 'P,' by 'a'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
program
replace 'program' by 'P,'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
Web-Assembly
replace 'Web-Assembly' by 'program'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
original
replace 'original' by 'Web-Assembly'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
an
replace 'an' by 'original'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
Given
replace 'Given' by 'an'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
Population_size(P):
replace 'Population_size(P):' by 'Given'
(0)Metric (1)1. Given (2)an (3)original (4)Web-Assembly (5)program (6)P, (7)a (8)generated (9)corpus (10)of (11)WebAssembly (12)programs (13)V (14)= (15)vj,U9,...,Uy (16)where (17)vu; (18)is (19)a (20)variant (21)of (22)P, (23)the (24)population (25)size (26)is (27)defined (28)as:
(0)Metric (1)1. Population_size(P): (2)Given (3)an (4)original (5)Web-Assembly (6)program (7)P, (8)a (9)generated (10)corpus (11)of (12)WebAssembly (13)programs (14)V (15)= (16){vj,U9,...,Uy} (17)where (18)vu; (19)is (20)a (21)variant (22)of (23)P, (24)the (25)population (26)size (27)is (28)defined (29)as:
,Uy
Put a space after the comma.
Metric 1. Population_size(P): Given an original Web-Assembly program P, a generated corpus of WebAssembly programs V = {vj,U9,...,Uy} where vu; is a variant of P, the population size is defined as:
mutations
replace 'mutations' by 'mutations.'
(0)With (1)RQI1, (2)we (3)assess (4)the (5)ability (6)of (7)WASM-MUTATE (8)to (9)generate (10)WebAssembly (11)variants (12)that (13)are (14)statically (15)different (16)from (17)the (18)original (19)program, (20)including (21)after (22)their (23)compilation (24)to (25)x86 (26)machine (27)code. In (28)Figure (29)4, (30)we (31)show (32)the (33)steps (34)we (35)follow (36)to (37)answer (38)RQ]. We (39)run (40)WASM-MUTATE (41)on (42)the (43)corpus (44)of (45)303 (46)original (47)C (48)programs (49)described (50)in (51)the (52)first (53)row (54)of (55)Table (56)| (57)(step (58)qa) (59)in (60)figure). To (61)generate (62)the (63)variants: (64)1) (65)we (66)start (67)with (68)one (69)original (70)program (71)and (72)pass (73)it (74)to (75)WASM-MUTATE (76)to (77)generate (78)a (79)variant; (80)2) (81)the (82)variants (83)and (84)the (85)original (86)program (87)form (88)a (89)population (90)of (91)variants; (92)3) (93)we (94)randomly (95)select (96)a (97)program (98)from (99)this (100)population (101)and (102)pass (103)it (104)to (105)WASM-MUTATE (106)to (107)generate (108)another (109)variant, (110)which (111)we (112)add (113)to (114)the (115)population; (116)4) (117)we (118)then (119)restart (120)the (121)process (122)in (123)the (124)previous (125)step (126)to (127)stack (128)more (129)mutations. (130)This (131)procedure (132)is (133)carried (134)out (135)for (136)1 (137)hour. The (138)outcome (139)(step (140)(2) (141)in (142)the (143)figure) (144)is (145)a (146)population (147)containing (148)programs (149)with (150)many (151)stacked (152)transformations, (153)all (154)starting (155)from (156)an (157)original (158)WebAssembly (159)program. We (160)then (161)count (162)the (163)number (164)of (165)unique (166)variants (167)in (168)the (169)population. We (170)compute (171)the (172)sha256 (173)hash (174)of (175)each (176)variant (177)bytestream (178)in (179)order (180)to (181)calculate (182)the (183)population (184)size. We (185)define (186)the (187)population (188)size (189)metric (190)as:
(0)With (1)RQI1, (2)we (3)assess (4)the (5)ability (6)of (7)WASM-MUTATE (8)to (9)generate (10)WebAssembly (11)variants (12)that (13)are (14)statically (15)different (16)from (17)the (18)original (19)program, (20)including (21)after (22)their (23)compilation (24)to (25)x86 (26)machine (27)code. In (28)Figure (29)4 (30)we (31)show (32)the (33)steps (34)we (35)follow (36)to (37)answer (38)RQ]. We (39)run (40)WASM-MUTATE (41)on (42)the (43)corpus (44)of (45)303 (46)original (47)C (48)programs (49)described (50)in (51)the (52)first (53)row (54)of (55)Table (56)| (57)(step (58)qa) (59)in (60)figure). To (61)generate (62)the (63)variants: (64)1) (65)we (66)start (67)with (68)one (69)original (70)program (71)and (72)pass (73)it (74)to (75)WASM-MUTATE (76)to (77)generate (78)a (79)variant; (80)2) (81)the (82)variants (83)and (84)the (85)original (86)program (87)form (88)a (89)population (90)of (91)variants; (92)3) (93)we (94)randomly (95)select (96)a (97)program (98)from (99)this (100)population (101)and (102)pass (103)it (104)to (105)WASM-MUTATE (106)to (107)generate (108)another (109)variant, (110)which (111)we (112)add (113)to (114)the (115)population; (116)4) (117)we (118)then (119)restart (120)the (121)process (122)in (123)the (124)previous (125)step (126)to (127)stack (128)more (129)mutations (130)This (131)procedure (132)is (133)carried (134)out (135)for (136)1 (137)hour. The (138)outcome (139)(step (140)(2) (141)in (142)the (143)figure) (144)is (145)a (146)population (147)containing (148)programs (149)with (150)many (151)stacked (152)transformations, (153)all (154)starting (155)from (156)an (157)original (158)WebAssembly (159)program. We (160)then (161)count (162)the (163)number (164)of (165)unique (166)variants (167)in (168)the (169)population. We (170)compute (171)the (172)sha256 (173)hash (174)of (175)each (176)variant (177)bytestream (178)in (179)order (180)to (181)calculate (182)the (183)population (184)size. We (185)define (186)the (187)population (188)size (189)metric (190)as:
4
replace '4' by '4,'
(0)With (1)RQI1, (2)we (3)assess (4)the (5)ability (6)of (7)WASM-MUTATE (8)to (9)generate (10)WebAssembly (11)variants (12)that (13)are (14)statically (15)different (16)from (17)the (18)original (19)program, (20)including (21)after (22)their (23)compilation (24)to (25)x86 (26)machine (27)code. In (28)Figure (29)4, (30)we (31)show (32)the (33)steps (34)we (35)follow (36)to (37)answer (38)RQ]. We (39)run (40)WASM-MUTATE (41)on (42)the (43)corpus (44)of (45)303 (46)original (47)C (48)programs (49)described (50)in (51)the (52)first (53)row (54)of (55)Table (56)| (57)(step (58)qa) (59)in (60)figure). To (61)generate (62)the (63)variants: (64)1) (65)we (66)start (67)with (68)one (69)original (70)program (71)and (72)pass (73)it (74)to (75)WASM-MUTATE (76)to (77)generate (78)a (79)variant; (80)2) (81)the (82)variants (83)and (84)the (85)original (86)program (87)form (88)a (89)population (90)of (91)variants; (92)3) (93)we (94)randomly (95)select (96)a (97)program (98)from (99)this (100)population (101)and (102)pass (103)it (104)to (105)WASM-MUTATE (106)to (107)generate (108)another (109)variant, (110)which (111)we (112)add (113)to (114)the (115)population; (116)4) (117)we (118)then (119)restart (120)the (121)process (122)in (123)the (124)previous (125)step (126)to (127)stack (128)more (129)mutations. (130)This (131)procedure (132)is (133)carried (134)out (135)for (136)1 (137)hour. The (138)outcome (139)(step (140)(2) (141)in (142)the (143)figure) (144)is (145)a (146)population (147)containing (148)programs (149)with (150)many (151)stacked (152)transformations, (153)all (154)starting (155)from (156)an (157)original (158)WebAssembly (159)program. We (160)then (161)count (162)the (163)number (164)of (165)unique (166)variants (167)in (168)the (169)population. We (170)compute (171)the (172)sha256 (173)hash (174)of (175)each (176)variant (177)bytestream (178)in (179)order (180)to (181)calculate (182)the (183)population (184)size. We (185)define (186)the (187)population (188)size (189)metric (190)as:
(0)With (1)RQI1, (2)we (3)assess (4)the (5)ability (6)of (7)WASM-MUTATE (8)to (9)generate (10)WebAssembly (11)variants (12)that (13)are (14)statically (15)different (16)from (17)the (18)original (19)program, (20)including (21)after (22)their (23)compilation (24)to (25)x86 (26)machine (27)code. In (28)Figure (29)4 (30)we (31)show (32)the (33)steps (34)we (35)follow (36)to (37)answer (38)RQ]. We (39)run (40)WASM-MUTATE (41)on (42)the (43)corpus (44)of (45)303 (46)original (47)C (48)programs (49)described (50)in (51)the (52)first (53)row (54)of (55)Table (56)| (57)(step (58)qa) (59)in (60)figure). To (61)generate (62)the (63)variants: (64)1) (65)we (66)start (67)with (68)one (69)original (70)program (71)and (72)pass (73)it (74)to (75)WASM-MUTATE (76)to (77)generate (78)a (79)variant; (80)2) (81)the (82)variants (83)and (84)the (85)original (86)program (87)form (88)a (89)population (90)of (91)variants; (92)3) (93)we (94)randomly (95)select (96)a (97)program (98)from (99)this (100)population (101)and (102)pass (103)it (104)to (105)WASM-MUTATE (106)to (107)generate (108)another (109)variant, (110)which (111)we (112)add (113)to (114)the (115)population; (116)4) (117)we (118)then (119)restart (120)the (121)process (122)in (123)the (124)previous (125)step (126)to (127)stack (128)more (129)mutations (130)This (131)procedure (132)is (133)carried (134)out (135)for (136)1 (137)hour. The (138)outcome (139)(step (140)(2) (141)in (142)the (143)figure) (144)is (145)a (146)population (147)containing (148)programs (149)with (150)many (151)stacked (152)transformations, (153)all (154)starting (155)from (156)an (157)original (158)WebAssembly (159)program. We (160)then (161)count (162)the (163)number (164)of (165)unique (166)variants (167)in (168)the (169)population. We (170)compute (171)the (172)sha256 (173)hash (174)of (175)each (176)variant (177)bytestream (178)in (179)order (180)to (181)calculate (182)the (183)population (184)size. We (185)define (186)the (187)population (188)size (189)metric (190)as:
]
Unpaired symbol: ‘[’ seems to be missing
With RQI1, we assess the ability of WASM-MUTATE to generate WebAssembly variants that are statically different from the original program, including after their compilation to x86 machine code. In Figure 4 we show the steps we follow to answer RQ]. We run WASM-MUTATE on the corpus of 303 original C programs described in the first row of Table | (step qa) in figure). To generate the variants: 1) we start with one original program and pass it to WASM-MUTATE to generate a variant; 2) the variants and the original program form a population of variants; 3) we randomly select a program from this population and pass it to WASM-MUTATE to generate another variant, which we add to the population; 4) we then restart the process in the previous step to stack more mutations This procedure is carried out for 1 hour. The outcome (step (2) in the figure) is a population containing programs with many stacked transformations, all starting from an original WebAssembly program. We then count the number of unique variants in the population. We compute the sha256 hash of each variant bytestream in order to calculate the population size. We define the population size metric as:
RQ1
replace 'RQ1' by 'R'
(0)4.2. Protocol (1)for (2)RQ1 (3)Protocol (4)for (5)RQ1 (6)Protocol (7)for (8)RQ1 (9)Protocol (10)for (11)RQ1 (12)Protocol (13)for (14)RQ1 (15)Protocol (16)for (17)RQ1 (18)Protocol (19)for (20)RQ1 (21)Protocol (22)for (23)RQ1 (24)Protocol (25)for (26)RQ1 (27)Protocol (28)for (29)RQ1 (30)Protocol (31)for (32)RQ1 (33)Protocol (34)for (35)RQ1 (36)Protocol (37)for (38)RQ1 (39)Protocol (40)for (41)RQ1 (42)Protocol (43)for (44)RQ1 (45)Protocol (46)for (47)RQ1 (48)Protocol (49)for (50)RQ1 (51)Protocol (52)for (53)RQ1 (54)Protocol (55)for (56)RQ1 (57)Protocol (58)for (59)RQ1 (60)Protocol (61)for (62)RQ1 (63)Protocol (64)for (65)RQ1 (66)Protocol (67)for (68)R
(0)4.2. Protocol (1)for (2)RQ1
insert '' by 'RQ1'
(0)4.2. Protocol (1)for (2)RQ1 (3)Protocol (4)for (5)RQ1 (6)Protocol (7)for (8)RQ1 (9)Protocol (10)for (11)RQ1 (12)Protocol (13)for (14)RQ1 (15)Protocol (16)for (17)RQ1 (18)Protocol (19)for (20)RQ1 (21)Protocol (22)for (23)RQ1 (24)Protocol (25)for (26)RQ1 (27)Protocol (28)for (29)RQ1 (30)Protocol (31)for (32)RQ1 (33)Protocol (34)for (35)RQ1 (36)Protocol (37)for (38)RQ1 (39)Protocol (40)for (41)RQ1 (42)Protocol (43)for (44)RQ1 (45)Protocol (46)for (47)RQ1 (48)Protocol (49)for (50)RQ1 (51)Protocol (52)for (53)RQ1 (54)Protocol (55)for (56)RQ1 (57)Protocol (58)for (59)RQ1 (60)Protocol (61)for (62)RQ1 (63)Protocol (64)for (65)RQ1 (66)Protocol (67)for (68)R
(0)4.2. Protocol (1)for (2)RQ1
insert '' by 'for'
(0)4.2. Protocol (1)for (2)RQ1 (3)Protocol (4)for (5)RQ1 (6)Protocol (7)for (8)RQ1 (9)Protocol (10)for (11)RQ1 (12)Protocol (13)for (14)RQ1 (15)Protocol (16)for (17)RQ1 (18)Protocol (19)for (20)RQ1 (21)Protocol (22)for (23)RQ1 (24)Protocol (25)for (26)RQ1 (27)Protocol (28)for (29)RQ1 (30)Protocol (31)for (32)RQ1 (33)Protocol (34)for (35)RQ1 (36)Protocol (37)for (38)RQ1 (39)Protocol (40)for (41)RQ1 (42)Protocol (43)for (44)RQ1 (45)Protocol (46)for (47)RQ1 (48)Protocol (49)for (50)RQ1 (51)Protocol (52)for (53)RQ1 (54)Protocol (55)for (56)RQ1 (57)Protocol (58)for (59)RQ1 (60)Protocol (61)for (62)RQ1 (63)Protocol (64)for (65)RQ1 (66)Protocol (67)for (68)R
(0)4.2. Protocol (1)for (2)RQ1
insert '' by 'Protocol'
(0)4.2. Protocol (1)for (2)RQ1 (3)Protocol (4)for (5)RQ1 (6)Protocol (7)for (8)RQ1 (9)Protocol (10)for (11)RQ1 (12)Protocol (13)for (14)RQ1 (15)Protocol (16)for (17)RQ1 (18)Protocol (19)for (20)RQ1 (21)Protocol (22)for (23)RQ1 (24)Protocol (25)for (26)RQ1 (27)Protocol (28)for (29)RQ1 (30)Protocol (31)for (32)RQ1 (33)Protocol (34)for (35)RQ1 (36)Protocol (37)for (38)RQ1 (39)Protocol (40)for (41)RQ1 (42)Protocol (43)for (44)RQ1 (45)Protocol (46)for (47)RQ1 (48)Protocol (49)for (50)RQ1 (51)Protocol (52)for (53)RQ1 (54)Protocol (55)for (56)RQ1 (57)Protocol (58)for (59)RQ1 (60)Protocol (61)for (62)RQ1 (63)Protocol (64)for (65)RQ1 (66)Protocol (67)for (68)R
(0)4.2. Protocol (1)for (2)RQ1
sourcing
replace 'sourcing' by 'sourced'
(0)We (1)address (2)RQ4 (3)with (4)four (5)WebAssembly (6)programs (7)and (8)three (9)Spectre (10)attack (11)scenarios (12)sourced (13)from (14)the (15)Swivel (16)and (17)Safeside (18)projects (19)[38, (20)22]. The (21)specifics (22)of (23)these (24)programs (25)are (26)revealed (27)in (28)the (29)final (30)two (31)rows (32)of (33)Table (34)|. The (35)first (36)two (37)programs, (38)containing (39)297 (40)and (41)743 (42)instructions (43)respectively, (44)are (45)intentionally (46)designed (47)for (48)the (49)Spectre (50)branch (51)target (52)attack (53)(BTB). These (54)programs (55)have (56)954 (57)and (58)1910 (59)bytes (60)in (61)size. The (62)last (63)two (64)programs, (65)presented (66)in (67)the (68)final (69)row, (70)are (71)derived (72)from (73)the (74)Safeside (75)project (76)[22]. Unlike (77)the (78)first (79)pair, (80)these (81)programs (82)are (83)substantially (84)larger, (85)containing (86)more (87)than (88)300000 (89)instructions (90)each (91)and (92)having (93)sizes (94)exceeding (95)1500000 (96)bytes. They (97)are (98)used (99)to (100)execute (101)the (102)Spectre (103)Return (104)Stack (105)(RSB) (106)and (107)Spectre (108)Pattern (109)History (110)(PHT) (111)attacks (112)[30]. The (113)significant (114)difference (115)in (116)terms (117)of (118)the (119)number (120)of (121)instructions (122)and (123)sizes (124)of (125)the (126)first (127)two (128)programs (129)and (130)the (131)last (132)pair (133)is (134)due (135)to (136)the (137)contrasting (138)compilation (139)processes (140)used (141)for (142)these (143)WebAssembly (144)binaries. A (145)detailed (146)description (147)of (148)the (149)three (150)attack (151)scenarios (152)is (153)provided (154)in (155)subsection (156)4.5.
(0)We (1)address (2)RQ4 (3)with (4)four (5)WebAssembly (6)programs (7)and (8)three (9)Spectre (10)attack (11)scenarios (12)sourcing (13)from (14)the (15)Swivel (16)and (17)Safeside (18)projects (19)[38, (20)22]. The (21)specifics (22)of (23)these (24)programs (25)are (26)revealed (27)in (28)the (29)final (30)two (31)rows (32)of (33)Table (34)|. The (35)first (36)two (37)programs, (38)containing (39)297 (40)and (41)743 (42)instructions (43)respectively, (44)are (45)intentionally (46)designed (47)for (48)the (49)Spectre (50)branch (51)target (52)attack (53)(BTB). These (54)programs (55)have (56)954 (57)and (58)1910 (59)bytes (60)in (61)size. The (62)last (63)two (64)programs, (65)presented (66)in (67)the (68)final (69)row, (70)are (71)derived (72)from (73)the (74)Safeside (75)project (76)[22]. Unlike (77)the (78)first (79)pair, (80)these (81)programs (82)are (83)substantially (84)larger, (85)containing (86)more (87)than (88)300000 (89)instructions (90)each (91)and (92)having (93)sizes (94)exceeding (95)1500000 (96)bytes. They (97)are (98)used (99)to (100)execute (101)the (102)Spectre (103)Return (104)Stack (105)(RSB) (106)and (107)Spectre (108)Pattern (109)History (110)(PHT) (111)attacks (112)[30]. The (113)significant (114)difference (115)in (116)terms (117)of (118)the (119)number (120)of (121)instructions (122)and (123)sizes (124)of (125)the (126)first (127)two (128)programs (129)and (130)the (131)last (132)pair (133)is (134)due (135)to (136)the (137)contrasting (138)compilation (139)processes (140)used (141)for (142)these (143)WebAssembly (144)binaries. A (145)detailed (146)description (147)of (148)the (149)three (150)attack (151)scenarios (152)is (153)provided (154)in (155)subsection (156)4.5.
insert '' by 'questions.'
(0)Figure (1)4: (2)Protocol (3)to (4)answer (5)RQ1 (6)and (7)RQ2 (8)questions.
(0)Figure (1)4: (2)Protocol (3)to (4)answer (5)RQ1 (6)and (7)RQ2
insert '' by 'R'
(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R
(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2
insert '' by 'RQ2'
(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R
(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2
©
replace '©' by 'RQ2'
(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R
(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2
IntelPIN
replace 'IntelPIN' by 'RQ2'
(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R
(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2
trace
replace 'trace' by 'RQ2'
(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R
(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2
Mem
replace 'Mem' by 'IntelPIN'
(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R
(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2
insert '' by 'Mem'
(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R
(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2
insert '' by 'trace'
(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R
(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2
wasm-mutate
replace 'wasm-mutate' by 'Wasm-mutate'
(0)Wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11) (12)RQ2 (13) (14)RQ2 (15) (16)RQ2 (17) (18)RQ2 (19) (20)RQ2 (21) (22)RQ2 (23) (24)RQ2 (25) (26)RQ2 (27) (28)RQ2 (29) (30)RQ2 (31) (32)RQ2 (33) (34)RQ2 (35) (36)RQ2 (37) (38)RQ2 (39) (40)RQ2 (41) (42)RQ2 (43) (44)RQ2 (45) (46)R
(0)wasm-mutate (1)wasmtime (2)cranelift (3)compiler (4), (5)RQL (6)Ins (7)trace (8)Mem (9)trace (10)IntelPIN (11)© (12)RQ2
wasm-mutate
This sentence does not start with an uppercase letter.
wasm-mutate wasmtime cranelift compiler , RQL Ins trace Mem trace IntelPIN © RQ2
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)13 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)13 (5)of (6)25
wasmtime.
replace 'wasmtime.' by 'time.'
(0)For (1)RQ2, (2)we (3)evaluate (4)how (5)fast (6)WASM-MUTATE (7)can (8)generate (9)variants (10)that (11)offer (12)distinct (13)traces (14)compared (15)with (16)the (17)original (18)program. We (19)start (20)by (21)collecting (22)the (23)traces (24)of (25)the (26)original (27)program (28)when (29)executed (30)in (31)time. While (32)continuously (33)generating (34)variants (35)with (36)randomly (37)stacked (38)transformations, (39)we (40)collect (41)the (42)execution (43)traces (44)of (45)the (46)variants (47)as (48)well. We (49)record (50)the (51)time (52)passed (53)until (54)we (55)generate (56)a (57)variant (58)that (59)offers (60)different (61)execution (62)traces, (63)according (64)to (65)two (66)types (67)of (68)traces: (69)machine (70)code (71)instructions (72)and (73)memory (74)accesses. This (75)process (76)can (77)be (78)seen (79)in (80)the (81)enclosed (82)square (83)of (84)Figure (85)4, (86)annotated (87)with (88)RQ2.
(0)For (1)RQ2, (2)we (3)evaluate (4)how (5)fast (6)WASM-MUTATE (7)can (8)generate (9)variants (10)that (11)offer (12)distinct (13)traces (14)compared (15)with (16)the (17)original (18)program. We (19)start (20)by (21)collecting (22)the (23)traces (24)of (25)the (26)original (27)program (28)when (29)executed (30)in (31)wasmtime. While (32)continuously (33)generating (34)variants (35)with (36)randomly (37)stacked (38)transformations, (39)we (40)collect (41)the (42)execution (43)traces (44)of (45)the (46)variants (47)as (48)well. We (49)record (50)the (51)time (52)passed (53)until (54)we (55)generate (56)a (57)variant (58)that (59)offers (60)different (61)execution (62)traces, (63)according (64)to (65)two (66)types (67)of (68)traces: (69)machine (70)code (71)instructions (72)and (73)memory (74)accesses. This (75)process (76)can (77)be (78)seen (79)in (80)the (81)enclosed (82)square (83)of (84)Figure (85)4, (86)annotated (87)with (88)RQ2.
RQ2
replace 'RQ2' by 'R'
(0)4.3. Protocol (1)for (2)RQ2 (3)Protocol (4)for (5)RQ2 (6)Protocol (7)for (8)RQ2 (9)Protocol (10)for (11)RQ2 (12)Protocol (13)for (14)RQ2 (15)Protocol (16)for (17)RQ2 (18)Protocol (19)for (20)RQ2 (21)Protocol (22)for (23)RQ2 (24)Protocol (25)for (26)RQ2 (27)Protocol (28)for (29)RQ2 (30)Protocol (31)for (32)RQ2 (33)Protocol (34)for (35)RQ2 (36)Protocol (37)for (38)RQ2 (39)Protocol (40)for (41)RQ2 (42)Protocol (43)for (44)RQ2 (45)Protocol (46)for (47)RQ2 (48)Protocol (49)for (50)RQ2 (51)Protocol (52)for (53)RQ2 (54)Protocol (55)for (56)RQ2 (57)Protocol (58)for (59)RQ2 (60)Protocol (61)for (62)RQ2 (63)Protocol (64)for (65)RQ2 (66)Protocol (67)for (68)R
(0)4.3. Protocol (1)for (2)RQ2
insert '' by 'RQ2'
(0)4.3. Protocol (1)for (2)RQ2 (3)Protocol (4)for (5)RQ2 (6)Protocol (7)for (8)RQ2 (9)Protocol (10)for (11)RQ2 (12)Protocol (13)for (14)RQ2 (15)Protocol (16)for (17)RQ2 (18)Protocol (19)for (20)RQ2 (21)Protocol (22)for (23)RQ2 (24)Protocol (25)for (26)RQ2 (27)Protocol (28)for (29)RQ2 (30)Protocol (31)for (32)RQ2 (33)Protocol (34)for (35)RQ2 (36)Protocol (37)for (38)RQ2 (39)Protocol (40)for (41)RQ2 (42)Protocol (43)for (44)RQ2 (45)Protocol (46)for (47)RQ2 (48)Protocol (49)for (50)RQ2 (51)Protocol (52)for (53)RQ2 (54)Protocol (55)for (56)RQ2 (57)Protocol (58)for (59)RQ2 (60)Protocol (61)for (62)RQ2 (63)Protocol (64)for (65)RQ2 (66)Protocol (67)for (68)R
(0)4.3. Protocol (1)for (2)RQ2
insert '' by 'for'
(0)4.3. Protocol (1)for (2)RQ2 (3)Protocol (4)for (5)RQ2 (6)Protocol (7)for (8)RQ2 (9)Protocol (10)for (11)RQ2 (12)Protocol (13)for (14)RQ2 (15)Protocol (16)for (17)RQ2 (18)Protocol (19)for (20)RQ2 (21)Protocol (22)for (23)RQ2 (24)Protocol (25)for (26)RQ2 (27)Protocol (28)for (29)RQ2 (30)Protocol (31)for (32)RQ2 (33)Protocol (34)for (35)RQ2 (36)Protocol (37)for (38)RQ2 (39)Protocol (40)for (41)RQ2 (42)Protocol (43)for (44)RQ2 (45)Protocol (46)for (47)RQ2 (48)Protocol (49)for (50)RQ2 (51)Protocol (52)for (53)RQ2 (54)Protocol (55)for (56)RQ2 (57)Protocol (58)for (59)RQ2 (60)Protocol (61)for (62)RQ2 (63)Protocol (64)for (65)RQ2 (66)Protocol (67)for (68)R
(0)4.3. Protocol (1)for (2)RQ2
insert '' by 'Protocol'
(0)4.3. Protocol (1)for (2)RQ2 (3)Protocol (4)for (5)RQ2 (6)Protocol (7)for (8)RQ2 (9)Protocol (10)for (11)RQ2 (12)Protocol (13)for (14)RQ2 (15)Protocol (16)for (17)RQ2 (18)Protocol (19)for (20)RQ2 (21)Protocol (22)for (23)RQ2 (24)Protocol (25)for (26)RQ2 (27)Protocol (28)for (29)RQ2 (30)Protocol (31)for (32)RQ2 (33)Protocol (34)for (35)RQ2 (36)Protocol (37)for (38)RQ2 (39)Protocol (40)for (41)RQ2 (42)Protocol (43)for (44)RQ2 (45)Protocol (46)for (47)RQ2 (48)Protocol (49)for (50)RQ2 (51)Protocol (52)for (53)RQ2 (54)Protocol (55)for (56)RQ2 (57)Protocol (58)for (59)RQ2 (60)Protocol (61)for (62)RQ2 (63)Protocol (64)for (65)RQ2 (66)Protocol (67)for (68)R
(0)4.3. Protocol (1)for (2)RQ2
with
delete 'with' by ''
(0)Metric (1)3. Given (2)an (3)original (4)WebAssembly (5)program (6)P, (7)and (8)its (9)execution (10)trace (11)Ty, (12)the (13)time (14)until (15)a (16)different (17)trace (18)is (19)defined (20)as (21)the (22)time (23)between (24)the (25)diversification (26)process (27)starts (28)and (29)when (30)the (31)variant (32)V (33)is (34)generated (35)with (36)execution (37)trace (38)T, (39)# (40)T).
(0)Metric (1)3. Time (2)until (3)different (4)trace: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P, (11)and (12)its (13)execution (14)trace (15)Ty, (16)the (17)time (18)until (19)a (20)different (21)trace (22)is (23)defined (24)as (25)the (26)time (27)between (28)the (29)diversification (30)process (31)starts (32)and (33)when (34)the (35)variant (36)V (37)is (38)generated (39)with (40)execution (41)trace (42)T, (43)with (44)T, (45)# (46)T).
T,
delete 'T,' by ''
(0)Metric (1)3. Given (2)an (3)original (4)WebAssembly (5)program (6)P, (7)and (8)its (9)execution (10)trace (11)Ty, (12)the (13)time (14)until (15)a (16)different (17)trace (18)is (19)defined (20)as (21)the (22)time (23)between (24)the (25)diversification (26)process (27)starts (28)and (29)when (30)the (31)variant (32)V (33)is (34)generated (35)with (36)execution (37)trace (38)T, (39)# (40)T).
(0)Metric (1)3. Time (2)until (3)different (4)trace: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P, (11)and (12)its (13)execution (14)trace (15)Ty, (16)the (17)time (18)until (19)a (20)different (21)trace (22)is (23)defined (24)as (25)the (26)time (27)between (28)the (29)diversification (30)process (31)starts (32)and (33)when (34)the (35)variant (36)V (37)is (38)generated (39)with (40)execution (41)trace (42)T, (43)with (44)T, (45)# (46)T).
trace:
delete 'trace:' by ''
(0)Metric (1)3. Given (2)an (3)original (4)WebAssembly (5)program (6)P, (7)and (8)its (9)execution (10)trace (11)Ty, (12)the (13)time (14)until (15)a (16)different (17)trace (18)is (19)defined (20)as (21)the (22)time (23)between (24)the (25)diversification (26)process (27)starts (28)and (29)when (30)the (31)variant (32)V (33)is (34)generated (35)with (36)execution (37)trace (38)T, (39)# (40)T).
(0)Metric (1)3. Time (2)until (3)different (4)trace: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P, (11)and (12)its (13)execution (14)trace (15)Ty, (16)the (17)time (18)until (19)a (20)different (21)trace (22)is (23)defined (24)as (25)the (26)time (27)between (28)the (29)diversification (30)process (31)starts (32)and (33)when (34)the (35)variant (36)V (37)is (38)generated (39)with (40)execution (41)trace (42)T, (43)with (44)T, (45)# (46)T).
different
delete 'different' by ''
(0)Metric (1)3. Given (2)an (3)original (4)WebAssembly (5)program (6)P, (7)and (8)its (9)execution (10)trace (11)Ty, (12)the (13)time (14)until (15)a (16)different (17)trace (18)is (19)defined (20)as (21)the (22)time (23)between (24)the (25)diversification (26)process (27)starts (28)and (29)when (30)the (31)variant (32)V (33)is (34)generated (35)with (36)execution (37)trace (38)T, (39)# (40)T).
(0)Metric (1)3. Time (2)until (3)different (4)trace: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P, (11)and (12)its (13)execution (14)trace (15)Ty, (16)the (17)time (18)until (19)a (20)different (21)trace (22)is (23)defined (24)as (25)the (26)time (27)between (28)the (29)diversification (30)process (31)starts (32)and (33)when (34)the (35)variant (36)V (37)is (38)generated (39)with (40)execution (41)trace (42)T, (43)with (44)T, (45)# (46)T).
until
delete 'until' by ''
(0)Metric (1)3. Given (2)an (3)original (4)WebAssembly (5)program (6)P, (7)and (8)its (9)execution (10)trace (11)Ty, (12)the (13)time (14)until (15)a (16)different (17)trace (18)is (19)defined (20)as (21)the (22)time (23)between (24)the (25)diversification (26)process (27)starts (28)and (29)when (30)the (31)variant (32)V (33)is (34)generated (35)with (36)execution (37)trace (38)T, (39)# (40)T).
(0)Metric (1)3. Time (2)until (3)different (4)trace: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P, (11)and (12)its (13)execution (14)trace (15)Ty, (16)the (17)time (18)until (19)a (20)different (21)trace (22)is (23)defined (24)as (25)the (26)time (27)between (28)the (29)diversification (30)process (31)starts (32)and (33)when (34)the (35)variant (36)V (37)is (38)generated (39)with (40)execution (41)trace (42)T, (43)with (44)T, (45)# (46)T).
Time
delete 'Time' by ''
(0)Metric (1)3. Given (2)an (3)original (4)WebAssembly (5)program (6)P, (7)and (8)its (9)execution (10)trace (11)Ty, (12)the (13)time (14)until (15)a (16)different (17)trace (18)is (19)defined (20)as (21)the (22)time (23)between (24)the (25)diversification (26)process (27)starts (28)and (29)when (30)the (31)variant (32)V (33)is (34)generated (35)with (36)execution (37)trace (38)T, (39)# (40)T).
(0)Metric (1)3. Time (2)until (3)different (4)trace: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P, (11)and (12)its (13)execution (14)trace (15)Ty, (16)the (17)time (18)until (19)a (20)different (21)trace (22)is (23)defined (24)as (25)the (26)time (27)between (28)the (29)diversification (30)process (31)starts (32)and (33)when (34)the (35)variant (36)V (37)is (38)generated (39)with (40)execution (41)trace (42)T, (43)with (44)T, (45)# (46)T).
)
Unpaired symbol: ‘(’ seems to be missing
Metric 3. Time until different trace: Given an original WebAssembly program P, and its execution trace Ty, the time until a different trace is defined as the time between the diversification process starts and when the variant V is generated with execution trace T, with T, # T).
Algorithm
replace 'Algorithm' by 'algorithm'
(0)Note (1)that (2)the (3)protocol (4)described (5)earlier (6)can (7)be (8)mapped (9)to (10)algorithm (11)2. For (12)instance, (13)to (14)measure (15)population (16)size (17)for (18)each (19)tested (20)program, (21)one (22)could (23)measure (24)how (25)often (26)the (27)execution (28)of (29)Algorithm (30)2 (31)reaches (32)line (33)11. Similarly, (34)to (35)assess (36)the (37)level (38)of (39)preservation, (40)one (41)could (42)track (43)the (44)frequency (45)with (46)which (47)the (48)algorithm (49)arrives (50)at (51)line (52)13.
(0)Note (1)that (2)the (3)protocol (4)described (5)earlier (6)can (7)be (8)mapped (9)to (10)Algorithm (11)2. For (12)instance, (13)to (14)measure (15)population (16)size (17)for (18)each (19)tested (20)program, (21)one (22)could (23)measure (24)how (25)often (26)the (27)execution (28)of (29)Algorithm (30)2 (31)reaches (32)line (33)11. Similarly, (34)to (35)assess (36)the (37)level (38)of (39)preservation, (40)one (41)could (42)track (43)the (44)frequency (45)with (46)which (47)the (48)algorithm (49)arrives (50)at (51)line (52)13.
]
Unpaired symbol: ‘[’ seems to be missing
[CI] mov rdx, qword ptr [r14+0x100] CI] mov dword ptr [rdx+xe64], ecx Listing 6: Instructions trace with two events out of IntelPIN for the execution of a WebAssembly program with wasmtime. Each event records the corresponding machine code that executes.
sha256(C(P,)))
replace 'sha256(C(P,)))' by 'sha256(C(P,))'
(0)If (1)sha256(P,) (2)# (3)sha256(P,) (4)and (5)sha256(C(P,)) (6)# (7)sha256(C(P;)), (8)this (9)means (10)that (11)both (12)programs (13)are (14)still (15)different (16)after (17)being (18)compiled (19)to (20)machine (21)code, (22)and (23)this (24)means (25)that (26)the (27)Cranelift (28)compiler (29)has (30)not (31)removed (32)the (33)transformations (34)made (35)by (36)WASM-MUTATE.
(0)If (1)sha256(P,) (2)# (3)sha256(P,) (4)and (5)sha256(C(P,))) (6)# (7)sha256(C(P;)), (8)this (9)means (10)that (11)both (12)programs (13)are (14)still (15)different (16)after (17)being (18)compiled (19)to (20)machine (21)code, (22)and (23)this (24)means (25)that (26)the (27)Cranelift (28)compiler (29)has (30)not (31)removed (32)the (33)transformations (34)made (35)by (36)WASM-MUTATE.
,)
Put a space after the comma.
If sha256(P,) # sha256(P,) and sha256(C(P,))) # sha256(C(P;)), this means that both programs are still different after being compiled to machine code, and this means that the Cranelift compiler has not removed the transformations made by WASM-MUTATE.
insert '' by 'Vu,'
(0)Population_size (1)(P) (2)Vu, (3)EV (4)L. (5)Population_size (6)(P) (7)Vu, (8)EV (9)L. (10)Population_size (11)(P) (12)Vu, (13)EV (14)L. (15)Population_size (16)(P) (17)Vu, (18)EV (19)L. (20)Population_size (21)(P) (22)Vu, (23)EV (24)L. (25)Population_size (26)(P) (27)Vu, (28)EV (29)L. (30)Population_size (31)(P) (32)Vu, (33)EV (34)L. (35)Population_size (36)(P) (37)Vu, (38)EV (39)L. (40)Population_size (41)(P) (42)Vu,
(0)Population_size (1)(P) (2)Vu, (3)EV (4)L
insert '' by '(P)'
(0)Population_size (1)(P) (2)Vu, (3)EV (4)L. (5)Population_size (6)(P) (7)Vu, (8)EV (9)L. (10)Population_size (11)(P) (12)Vu, (13)EV (14)L. (15)Population_size (16)(P) (17)Vu, (18)EV (19)L. (20)Population_size (21)(P) (22)Vu, (23)EV (24)L. (25)Population_size (26)(P) (27)Vu, (28)EV (29)L. (30)Population_size (31)(P) (32)Vu, (33)EV (34)L. (35)Population_size (36)(P) (37)Vu, (38)EV (39)L. (40)Population_size (41)(P) (42)Vu,
(0)Population_size (1)(P) (2)Vu, (3)EV (4)L
insert '' by 'Population_size'
(0)Population_size (1)(P) (2)Vu, (3)EV (4)L. (5)Population_size (6)(P) (7)Vu, (8)EV (9)L. (10)Population_size (11)(P) (12)Vu, (13)EV (14)L. (15)Population_size (16)(P) (17)Vu, (18)EV (19)L. (20)Population_size (21)(P) (22)Vu, (23)EV (24)L. (25)Population_size (26)(P) (27)Vu, (28)EV (29)L. (30)Population_size (31)(P) (32)Vu, (33)EV (34)L. (35)Population_size (36)(P) (37)Vu, (38)EV (39)L. (40)Population_size (41)(P) (42)Vu,
(0)Population_size (1)(P) (2)Vu, (3)EV (4)L
L
replace 'L' by 'L.'
(0)Population_size (1)(P) (2)Vu, (3)EV (4)L. (5)Population_size (6)(P) (7)Vu, (8)EV (9)L. (10)Population_size (11)(P) (12)Vu, (13)EV (14)L. (15)Population_size (16)(P) (17)Vu, (18)EV (19)L. (20)Population_size (21)(P) (22)Vu, (23)EV (24)L. (25)Population_size (26)(P) (27)Vu, (28)EV (29)L. (30)Population_size (31)(P) (32)Vu, (33)EV (34)L. (35)Population_size (36)(P) (37)Vu, (38)EV (39)L. (40)Population_size (41)(P) (42)Vu,
(0)Population_size (1)(P) (2)Vu, (3)EV (4)L
insert '' by 'L.'
(0)Population_size (1)(P) (2)Vu, (3)EV (4)L. (5)Population_size (6)(P) (7)Vu, (8)EV (9)L. (10)Population_size (11)(P) (12)Vu, (13)EV (14)L. (15)Population_size (16)(P) (17)Vu, (18)EV (19)L. (20)Population_size (21)(P) (22)Vu, (23)EV (24)L. (25)Population_size (26)(P) (27)Vu, (28)EV (29)L. (30)Population_size (31)(P) (32)Vu, (33)EV (34)L. (35)Population_size (36)(P) (37)Vu, (38)EV (39)L. (40)Population_size (41)(P) (42)Vu,
(0)Population_size (1)(P) (2)Vu, (3)EV (4)L
insert '' by 'EV'
(0)Population_size (1)(P) (2)Vu, (3)EV (4)L. (5)Population_size (6)(P) (7)Vu, (8)EV (9)L. (10)Population_size (11)(P) (12)Vu, (13)EV (14)L. (15)Population_size (16)(P) (17)Vu, (18)EV (19)L. (20)Population_size (21)(P) (22)Vu, (23)EV (24)L. (25)Population_size (26)(P) (27)Vu, (28)EV (29)L. (30)Population_size (31)(P) (32)Vu, (33)EV (34)L. (35)Population_size (36)(P) (37)Vu, (38)EV (39)L. (40)Population_size (41)(P) (42)Vu,
(0)Population_size (1)(P) (2)Vu, (3)EV (4)L
variants:
delete 'variants:' by ''
(0)Metric (1)2. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)its (9)population (10)size (11)as (12)defined (13)in (14)Metric (15)1 (16)and (17)the (18)JIT (19)compiler (20)C, (21)we (22)defined (23)the (24)ratio (25)of (26)preserved (27)variants (28)as:
(0)Metric (1)2. Ratio (2)of (3)preserved (4)variants: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P (11)and (12)its (13)population (14)size (15)as (16)defined (17)in (18)Metric (19)1 (20)and (21)the (22)JIT (23)compiler (24)C, (25)we (26)defined (27)the (28)ratio (29)of (30)preserved (31)variants (32)as:
preserved
delete 'preserved' by ''
(0)Metric (1)2. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)its (9)population (10)size (11)as (12)defined (13)in (14)Metric (15)1 (16)and (17)the (18)JIT (19)compiler (20)C, (21)we (22)defined (23)the (24)ratio (25)of (26)preserved (27)variants (28)as:
(0)Metric (1)2. Ratio (2)of (3)preserved (4)variants: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P (11)and (12)its (13)population (14)size (15)as (16)defined (17)in (18)Metric (19)1 (20)and (21)the (22)JIT (23)compiler (24)C, (25)we (26)defined (27)the (28)ratio (29)of (30)preserved (31)variants (32)as:
of
delete 'of' by ''
(0)Metric (1)2. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)its (9)population (10)size (11)as (12)defined (13)in (14)Metric (15)1 (16)and (17)the (18)JIT (19)compiler (20)C, (21)we (22)defined (23)the (24)ratio (25)of (26)preserved (27)variants (28)as:
(0)Metric (1)2. Ratio (2)of (3)preserved (4)variants: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P (11)and (12)its (13)population (14)size (15)as (16)defined (17)in (18)Metric (19)1 (20)and (21)the (22)JIT (23)compiler (24)C, (25)we (26)defined (27)the (28)ratio (29)of (30)preserved (31)variants (32)as:
Ratio
delete 'Ratio' by ''
(0)Metric (1)2. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)its (9)population (10)size (11)as (12)defined (13)in (14)Metric (15)1 (16)and (17)the (18)JIT (19)compiler (20)C, (21)we (22)defined (23)the (24)ratio (25)of (26)preserved (27)variants (28)as:
(0)Metric (1)2. Ratio (2)of (3)preserved (4)variants: (5)Given (6)an (7)original (8)WebAssembly (9)program (10)P (11)and (12)its (13)population (14)size (15)as (16)defined (17)in (18)Metric (19)1 (20)and (21)the (22)JIT (23)compiler (24)C, (25)we (26)defined (27)the (28)ratio (29)of (30)preserved (31)variants (32)as:
CWrit]
replace 'CWrit]' by '[Read]'
(0)[Read] (1)@x555555ed1570 (2)size=4 (3)value=0x1@dda (4)[Read] (5)@x555555ed1570 (6)size=4 (7)value=0x10dda (8)Listing (9)5: (10)Memory (11)trace (12)with (13)two (14)events (15)out (16)of (17)IntelPIN (18)for (19)the (20)execution (21)of (22)a (23)WebAssembly (24)program (25)with (26)wasmtime. Trace (27)events (28)record: (29)the (30)type (31)of (32)the (33)operation, (34)read (35)or (36)write, (37)the (38)memory (39)address, (40)the (41)number (42)of (43)bytes (44)affected (45)and (46)the (47)value (48)read (49)or (50)written.
(0)CWrit] (1)@x555555ed1570 (2)size=4 (3)value=0x1@dda (4)[Read] (5)@x555555ed1570 (6)size=4 (7)value=0x10dda (8)Listing (9)5: (10)Memory (11)trace (12)with (13)two (14)events (15)out (16)of (17)IntelPIN (18)for (19)the (20)execution (21)of (22)a (23)WebAssembly (24)program (25)with (26)wasmtime. Trace (27)events (28)record: (29)the (30)type (31)of (32)the (33)operation, (34)read (35)or (36)write, (37)the (38)memory (39)address, (40)the (41)number (42)of (43)bytes (44)affected (45)and (46)the (47)value (48)read (49)or (50)written.
]
Unpaired symbol: ‘[’ seems to be missing
CWrit] @x555555ed1570 size=4 value=0x1@dda [Read] @x555555ed1570 size=4 value=0x10dda Listing 5: Memory trace with two events out of IntelPIN for the execution of a WebAssembly program with wasmtime. Trace events record: the type of the operation, read or write, the memory address, the number of bytes affected and the value read or written.
ratio:
replace 'ratio:' by 'ratio.'
(0)Since (1)WebAssembly (2)binaries (3)may (4)be (5)further (6)transformed (7)into (8)machine (9)code (10)before (11)they (12)execute, (13)we (14)also (15)check (16)that (17)these (18)additional (19)transformations (20)preserve (21)the (22)difference (23)introduced (24)by (25)WASM-MUTATE (26)in (27)the (28)WebAssembly (29)binary. We (30)use (31)the (32)wasmtime (33)JIT (34)compiler, (35)Cranelift, (36)with (37)all (38)available (39)optimizations, (40)to (41)generate (42)the (43)x86 (44)binaries (45)for (46)each (47)WebAssembly (48)program (49)and (50)its (51)variants (52)(step (53)GB) (54)in (55)figure). Then, (56)we (57)calculate (58)the (59)number (60)of (61)unique (62)variants (63)of (64)machine (65)code (66)representation (67)for (68)wasmtime. Counting (69)the (70)number (71)of (72)unique (73)machine (74)codes, (75)we (76)compute (77)the (78)diversification (79)preservation (80)ratio.
(0)Since (1)WebAssembly (2)binaries (3)may (4)be (5)further (6)transformed (7)into (8)machine (9)code (10)before (11)they (12)execute, (13)we (14)also (15)check (16)that (17)these (18)additional (19)transformations (20)preserve (21)the (22)difference (23)introduced (24)by (25)WASM-MUTATE (26)in (27)the (28)WebAssembly (29)binary. We (30)use (31)the (32)wasmtime (33)JIT (34)compiler, (35)Cranelift, (36)with (37)all (38)available (39)optimizations, (40)to (41)generate (42)the (43)x86 (44)binaries (45)for (46)each (47)WebAssembly (48)program (49)and (50)its (51)variants (52)(step (53)GB) (54)in (55)figure). Then, (56)we (57)calculate (58)the (59)number (60)of (61)unique (62)variants (63)of (64)machine (65)code (66)representation (67)for (68)wasmtime. Counting (69)the (70)number (71)of (72)unique (73)machine (74)codes, (75)we (76)compute (77)the (78)diversification (79)preservation (80)ratio:
)
Unpaired symbol: ‘(’ seems to be missing
Since WebAssembly binaries may be further transformed into machine code before they execute, we also check that these additional transformations preserve the difference introduced by WASM-MUTATE in the WebAssembly binary. We use the wasmtime JIT compiler, Cranelift, with all available optimizations, to generate the x86 binaries for each WebAssembly program and its variants (step GB) in figure). Then, we calculate the number of unique variants of machine code representation for wasmtime. Counting the number of unique machine codes, we compute the diversification preservation ratio:
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)14 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)14 (5)of (6)25
k»,...,ky
delete 'k»,...,ky' by ''
(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?
(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?
ky,
delete 'ky,' by ''
(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?
(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?
=
replace '=' by 'k»,,ky'
(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?
(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?
K
replace 'K' by 'ky,'
(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?
(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?
9C
replace '9C' by '='
(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?
(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?
5
replace '5' by 'K'
(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?
(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?
'0>
replace ''0>' by '9C'
(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?
(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?
D
replace 'D' by '5'
(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?
(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?
data
replace 'data' by ''0>'
(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?
(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?
Given
replace 'Given' by 'D'
(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?
(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?
bandwidth:
replace 'bandwidth:' by 'data'
(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?
(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?
Attack
replace 'Attack' by 'Given'
(0)Metric (1)6. Given (2)data (3)D (4)'0> (5)5 (6)9C (7)K (8)= (9)ky, (10)k»,,ky (11)the (12)collection (13)of (14)correct (15)data (16)bytes, (17)the (18)?
(0)Metric (1)6. Attack (2)bandwidth: (3)Given (4)data (5)D (6)'0> (7)5 (8)9C (9)K (10)= (11)ky, (12)k»,...,ky (13)the (14)collection (15)of (16)correct (17)data (18)bytes, (19)the (20)?
'
Unpaired symbol: ‘'’ seems to be missing
Metric 6. Attack bandwidth: Given data D '0> 5 9C K = ky, k»,...,ky the collection of correct data bytes, the ?
init
replace 'init' by 'Init'
(0)Init (1)measures (2)the (3)time (4)of (5)executing (6)the (7)_start (8)function (9)of (10)an (11)already (12)JITed (13)WebAssembly (14)binary.
(0)init (1)measures (2)the (3)time (4)of (5)executing (6)the (7)_start (8)function (9)of (10)an (11)already (12)JITed (13)WebAssembly (14)binary.
init
This sentence does not start with an uppercase letter.
init(V) init(P)
:
delete ':' by ''
(0)Notice (1)that, (2)the (3)bandwidth (4)metric (5)captures (6)not (7)only (8)whether (9)the (10)attacks (11)are (12)successful (13)or (14)not, (15)but (16)also (17)the (18)degree (19)to (20)which (21)the (22)data (23)exfiltration (24)is (25)hindered. For (26)instance, (27)a (28)variant (29)that (30)continues (31)to (32)exfiltrate (33)secret (34)data (35)but (36)does (37)so (38)over (39)an (40)impractical (41)duration (42)would (43)be (44)deemed (45)as (46)having (47)been (48)hardened. For (49)this, (50)we (51)state (52)the (53)bandwidth (54)metric (55)in (56)the (57)following (58)definition:
(0)Notice (1)that, (2)the (3)bandwidth (4)metric (5)captures (6)not (7)only (8)whether (9)the (10)attacks (11)are (12)successful (13)or (14)not, (15)but (16)also (17)the (18)degree (19)to (20)which (21)the (22)data (23)exfiltration (24)is (25)hindered. For (26)instance, (27)a (28)variant (29)that (30)continues (31)to (32)exfiltrate (33)secret (34)data (35)but (36)does (37)so (38)over (39)an (40)impractical (41)duration (42)would (43)be (44)deemed (45)as (46)having (47)been (48)hardened. For (49)this, (50)we (51)state (52)the (53)bandwidth (54)metric (55)in (56)the (57)following (58)definition (59):
definition
replace 'definition' by 'definition:'
(0)Notice (1)that, (2)the (3)bandwidth (4)metric (5)captures (6)not (7)only (8)whether (9)the (10)attacks (11)are (12)successful (13)or (14)not, (15)but (16)also (17)the (18)degree (19)to (20)which (21)the (22)data (23)exfiltration (24)is (25)hindered. For (26)instance, (27)a (28)variant (29)that (30)continues (31)to (32)exfiltrate (33)secret (34)data (35)but (36)does (37)so (38)over (39)an (40)impractical (41)duration (42)would (43)be (44)deemed (45)as (46)having (47)been (48)hardened. For (49)this, (50)we (51)state (52)the (53)bandwidth (54)metric (55)in (56)the (57)following (58)definition:
(0)Notice (1)that, (2)the (3)bandwidth (4)metric (5)captures (6)not (7)only (8)whether (9)the (10)attacks (11)are (12)successful (13)or (14)not, (15)but (16)also (17)the (18)degree (19)to (20)which (21)the (22)data (23)exfiltration (24)is (25)hindered. For (26)instance, (27)a (28)variant (29)that (30)continues (31)to (32)exfiltrate (33)secret (34)data (35)but (36)does (37)so (38)over (39)an (40)impractical (41)duration (42)would (43)be (44)deemed (45)as (46)having (47)been (48)hardened. For (49)this, (50)we (51)state (52)the (53)bandwidth (54)metric (55)in (56)the (57)following (58)definition (59):
divided
replace 'divided' by 'divide'
(0)For (1)each (2)of (3)the (4)four (5)WebAssembly (6)binaries (7)introduced (8)in (9)subsection (10)4.1, (11)we (12)generated (13)a (14)maximum (15)of (16)1000 (17)random (18)stacked (19)transformations (20)utilizing (21)100 (22)distinct (23)seeds. This (24)resulted (25)in (26)a (27)total (28)of (29)100,000 (30)variants (31)for (32)each (33)original (34)WebAssembly (35)binary. We (36)then (37)assess (38)the (39)success (40)rate (41)of (42)attacks (43)across (44)these (45)variants (46)by (47)measuring (48)the (49)bandwidth (50)of (51)the (52)exfiltrated (53)data, (54)that (55)is: (56)the (57)rate (58)of (59)correctly (60)leaked (61)bytes (62)per (63)unit (64)of (65)time. We (66)then (67)count (68)the (69)correctly (70)exfiltrated (71)bytes (72)and (73)divide (74)them (75)by (76)the (77)variant (78)program’s (79)execution (80)time.
(0)For (1)each (2)of (3)the (4)four (5)WebAssembly (6)binaries (7)introduced (8)in (9)subsection (10)4.1, (11)we (12)generated (13)a (14)maximum (15)of (16)1000 (17)random (18)stacked (19)transformations (20)utilizing (21)100 (22)distinct (23)seeds. This (24)resulted (25)in (26)a (27)total (28)of (29)100,000 (30)variants (31)for (32)each (33)original (34)WebAssembly (35)binary. We (36)then (37)assess (38)the (39)success (40)rate (41)of (42)attacks (43)across (44)these (45)variants (46)by (47)measuring (48)the (49)bandwidth (50)of (51)the (52)exfiltrated (53)data, (54)that (55)is: (56)the (57)rate (58)of (59)correctly (60)leaked (61)bytes (62)per (63)unit (64)of (65)time. We (66)then (67)count (68)the (69)correctly (70)exfiltrated (71)bytes (72)and (73)divided (74)them (75)by (76)the (77)variant (78)program’s (79)execution (80)time.
P|
replace 'P|' by 'P|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||'
(0)|MV| (1)|M (2)P|| (3)|MV| (4)|M (5)P|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(0)|MV| (1)|M (2)P|
insert '' by 'P||'
(0)|MV| (1)|M (2)P|| (3)|MV| (4)|M (5)P|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(0)|MV| (1)|M (2)P|
insert '' by '|M'
(0)|MV| (1)|M (2)P|| (3)|MV| (4)|M (5)P|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(0)|MV| (1)|M (2)P|
insert '' by '|MV|'
(0)|MV| (1)|M (2)P|| (3)|MV| (4)|M (5)P|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(0)|MV| (1)|M (2)P|
impact:
delete 'impact:' by ''
(0)Metric (1)4. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)a (9)variant (10)V, (11)given (12)MP (13)and (14)MV (15)the (16)machine (17)code (18)for (19)P (20)and (21)V (22)respectively, (23)the (24)relative (25)machine (26)code (27)size (28)is (29)defined (30)as:
(0)Metric (1)4. Relative (2)Machine (3)Code (4)size (5)impact: (6)Given (7)an (8)original (9)WebAssembly (10)program (11)P (12)and (13)a (14)variant (15)V, (16)given (17)MP (18)and (19)MV (20)the (21)machine (22)code (23)for (24)P (25)and (26)V (27)respectively, (28)the (29)relative (30)machine (31)code (32)size (33)is (34)defined (35)as:
size
delete 'size' by ''
(0)Metric (1)4. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)a (9)variant (10)V, (11)given (12)MP (13)and (14)MV (15)the (16)machine (17)code (18)for (19)P (20)and (21)V (22)respectively, (23)the (24)relative (25)machine (26)code (27)size (28)is (29)defined (30)as:
(0)Metric (1)4. Relative (2)Machine (3)Code (4)size (5)impact: (6)Given (7)an (8)original (9)WebAssembly (10)program (11)P (12)and (13)a (14)variant (15)V, (16)given (17)MP (18)and (19)MV (20)the (21)machine (22)code (23)for (24)P (25)and (26)V (27)respectively, (28)the (29)relative (30)machine (31)code (32)size (33)is (34)defined (35)as:
Code
delete 'Code' by ''
(0)Metric (1)4. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)a (9)variant (10)V, (11)given (12)MP (13)and (14)MV (15)the (16)machine (17)code (18)for (19)P (20)and (21)V (22)respectively, (23)the (24)relative (25)machine (26)code (27)size (28)is (29)defined (30)as:
(0)Metric (1)4. Relative (2)Machine (3)Code (4)size (5)impact: (6)Given (7)an (8)original (9)WebAssembly (10)program (11)P (12)and (13)a (14)variant (15)V, (16)given (17)MP (18)and (19)MV (20)the (21)machine (22)code (23)for (24)P (25)and (26)V (27)respectively, (28)the (29)relative (30)machine (31)code (32)size (33)is (34)defined (35)as:
Machine
delete 'Machine' by ''
(0)Metric (1)4. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)a (9)variant (10)V, (11)given (12)MP (13)and (14)MV (15)the (16)machine (17)code (18)for (19)P (20)and (21)V (22)respectively, (23)the (24)relative (25)machine (26)code (27)size (28)is (29)defined (30)as:
(0)Metric (1)4. Relative (2)Machine (3)Code (4)size (5)impact: (6)Given (7)an (8)original (9)WebAssembly (10)program (11)P (12)and (13)a (14)variant (15)V, (16)given (17)MP (18)and (19)MV (20)the (21)machine (22)code (23)for (24)P (25)and (26)V (27)respectively, (28)the (29)relative (30)machine (31)code (32)size (33)is (34)defined (35)as:
Relative
delete 'Relative' by ''
(0)Metric (1)4. Given (2)an (3)original (4)WebAssembly (5)program (6)P (7)and (8)a (9)variant (10)V, (11)given (12)MP (13)and (14)MV (15)the (16)machine (17)code (18)for (19)P (20)and (21)V (22)respectively, (23)the (24)relative (25)machine (26)code (27)size (28)is (29)defined (30)as:
(0)Metric (1)4. Relative (2)Machine (3)Code (4)size (5)impact: (6)Given (7)an (8)original (9)WebAssembly (10)program (11)P (12)and (13)a (14)variant (15)V, (16)given (17)MP (18)and (19)MV (20)the (21)machine (22)code (23)for (24)P (25)and (26)V (27)respectively, (28)the (29)relative (30)machine (31)code (32)size (33)is (34)defined (35)as:
specula-tive
replace 'specula-tive' by 'speculative'
(0)Narayan (1)and (2)colleagues (3)successfully (4)bypass (5)the (6)control (7)flow (8)integrity (9)safeguards (10)of (11)WebAssembly, (12)using (13)speculative (14)code (15)execution (16)as (17)detailed (18)in (19)[30]. Thus, (20)we (21)use (22)the (23)same (24)three (25)Spectre (26)attacks (27)from (28)Swivel: (29)1) (30)The (31)Spectre (32)Branch (33)Target (34)Buffer (35)(btb) (36)attack (37)exploits (38)the (39)branch (40)target (41)buffer (42)by (43)predicting (44)the (45)target (46)of (47)an (48)indirect (49)jump, (50)thereby (51)rerouting (52)speculative (53)control (54)flow (55)to (56)an (57)arbitrary (58)target. 2) (59)The (60)Spectre (61)Pattern (62)History (63)Table (64)(pht) (65)takes (66)advantage (67)of (68)the (69)pattern (70)history (71)table (72)to (73)anticipate (74)the (75)direction (76)of (77)a (78)conditional (79)branch (80)during (81)the (82)ongoing (83)evaluation (84)of (85)a (86)condition. 3) (87)The (88)Spectre (89)Return (90)Stack (91)Buffer (92)(ret2spec) (93)attack (94)exploits (95)the (96)return (97)stack (98)buffer (99)that (100)stores (101)the (102)locations (103)of (104)recently (105)executed (106)call (107)instructions (108)to (109)predict (110)the (111)target (112)of (113)ret (114)instructions. Each (115)attack (116)methodology (117)relies (118)on (119)the (120)extraction (121)of (122)memory (123)bytes (124)from (125)another (126)hosted (127)WebAssembly (128)binary (129)that (130)executes (131)in (132)parallel.
(0)Narayan (1)and (2)colleagues (3)successfully (4)bypass (5)the (6)control (7)flow (8)integrity (9)safeguards (10)of (11)WebAssembly, (12)using (13)specula-tive (14)code (15)execution (16)as (17)detailed (18)in (19)[30]. Thus, (20)we (21)use (22)the (23)same (24)three (25)Spectre (26)attacks (27)from (28)Swivel: (29)1) (30)The (31)Spectre (32)Branch (33)Target (34)Buffer (35)(btb) (36)attack (37)exploits (38)the (39)branch (40)target (41)buffer (42)by (43)predicting (44)the (45)target (46)of (47)an (48)indirect (49)jump, (50)thereby (51)rerouting (52)speculative (53)control (54)flow (55)to (56)an (57)arbitrary (58)target. 2) (59)The (60)Spectre (61)Pattern (62)History (63)Table (64)(pht) (65)takes (66)advantage (67)of (68)the (69)pattern (70)history (71)table (72)to (73)anticipate (74)the (75)direction (76)of (77)a (78)conditional (79)branch (80)during (81)the (82)ongoing (83)evaluation (84)of (85)a (86)condition. 3) (87)The (88)Spectre (89)Return (90)Stack (91)Buffer (92)(ret2spec) (93)attack (94)exploits (95)the (96)return (97)stack (98)buffer (99)that (100)stores (101)the (102)locations (103)of (104)recently (105)executed (106)call (107)instructions (108)to (109)predict (110)the (111)target (112)of (113)ret (114)instructions. Each (115)attack (116)methodology (117)relies (118)on (119)the (120)extraction (121)of (122)memory (123)bytes (124)from (125)another (126)hosted (127)WebAssembly (128)binary (129)that (130)executes (131)in (132)parallel.
ret2spec
Possible typo detected.
Narayan and colleagues successfully bypass the control flow integrity safeguards of WebAssembly, using specula-tive code execution as detailed in [30]. Thus, we use the same three Spectre attacks from Swivel: 1) The Spectre Branch Target Buffer (btb) attack exploits the branch target buffer by predicting the target of an indirect jump, thereby rerouting speculative control flow to an arbitrary target. 2) The Spectre Pattern History Table (pht) takes advantage of the pattern history table to anticipate the direction of a conditional branch during the ongoing evaluation of a condition. 3) The Spectre Return Stack Buffer (ret2spec) attack exploits the return stack buffer that stores the locations of recently executed call instructions to predict the target of ret instructions. Each attack methodology relies on the extraction of memory bytes from another hosted WebAssembly binary that executes in parallel.
to
replace 'to' by 'To'
(0)To (1)answer (2)RQ4, (3)we (4)apply (5)WASM-MUTATE (6)to (7)the (8)same (9)security (10)WebAssembly (11)programs (12)used (13)by (14)Narayan (15)et (16)al. To (17)evaluate (18)Swivel’s (19)ability (20)to (21)protect (22)WebAssembly (23)programs (24)against (25)side-channel (26)attacks (27)[38]. The (28)four (29)cache (30)timing (31)side-channel (32)attacks (33)are (34)presented (35)in (36)detail (37)in (38)subsection (39)4.1. The (40)specific (41)binary (42)and (43)its (44)corresponding (45)attack (46)can (47)be (48)appreciated (49)in (50)Table (51)1. We (52)evaluate (53)to (54)what (55)extent (56)WASM-MUTATE (57)can (58)prevent (59)such (60)attacks. In (61)the (62)following (63)text, (64)we (65)describe (66)the (67)attacks (68)we (69)replicate (70)and (71)evaluate (72)in (73)order (74)to (75)answer (76)RQ4.
(0)To (1)answer (2)RQ4, (3)we (4)apply (5)WASM-MUTATE (6)to (7)the (8)same (9)security (10)WebAssembly (11)programs (12)used (13)by (14)Narayan (15)et (16)al. to (17)evaluate (18)Swivel’s (19)ability (20)to (21)protect (22)WebAssembly (23)programs (24)against (25)side-channel (26)attacks (27)[38]. The (28)four (29)cache (30)timing (31)side-channel (32)attacks (33)are (34)presented (35)in (36)detail (37)in (38)subsection (39)4.1. (40)The (41)specific (42)binary (43)and (44)its (45)corresponding (46)attack (47)can (48)be (49)appreciated (50)in (51)Table (52)1. We (53)evaluate (54)to (55)what (56)extent (57)WASM-MUTATE (58)can (59)prevent (60)such (61)attacks. In (62)the (63)following (64)text, (65)we (66)describe (67)the (68)attacks (69)we (70)replicate (71)and (72)evaluate (73)in (74)order (75)to (76)answer (77)RQ4.
insert '' by 'protocol.'
(0)4.5. Protocol (1)for (2)RQ4 (3)protocol.
(0)4.5. Protocol (1)for (2)RQ4
insert '' by 'protocol.'
(0)4.4. Protocol (1)for (2)RQ3 (3)protocol.
(0)4.4. Protocol (1)for (2)RQ3
25
replace '25' by '25.'
(0)We (1)collect (2)Metric (3)5 (4)after (5)running (6)each (7)program (8)and (9)variant (10)100 (11)times. We (12)discard (13)the (14)first (15)20 (16)measurements (17)to (18)remove (19)noise (20)and (21)warm (22)up (23)the (24)JIT (25)engine. Thus, (26)for (27)each (28)program (29)and (30)variant, (31)we (32)collect (33)80 (34)execution (35)times. 199, (36)91,-50C5 (37)Dellg (38)eEXfliirdied (39)Wl (40)llme (41)£ (42)aNd (43)| (44)K (45)= (46)ky, (47)k»,...,ky (48)the (49)collection (50)of (51)correct (52)data (53)bytes, (54)the (55)Cabrera-Arteaga (56)et (57)al. Page (58)15 (59)of (60)25.
(0)We (1)collect (2)Metric (3)5 (4)after (5)running (6)each (7)program (8)and (9)variant (10)100 (11)times. We (12)discard (13)the (14)first (15)20 (16)measurements (17)to (18)remove (19)noise (20)and (21)warm (22)up (23)the (24)JIT (25)engine. Thus, (26)for (27)each (28)program (29)and (30)variant, (31)we (32)collect (33)80 (34)execution (35)times. (36)199, (37)91,--50C5 (38)Dellg (39)eEXfliirdied (40)Wl (41)llme (42)£ (43)aNd (44)| (45)K (46)= (47)ky, (48)k»,...,ky (49)the (50)collection (51)of (52)correct (53)data (54)bytes, (55)the (56)Cabrera-Arteaga (57)et (58)al. (59)Page (60)15 (61)of (62)25
91,--50C5
replace '91,--50C5' by '91,-50C5'
(0)We (1)collect (2)Metric (3)5 (4)after (5)running (6)each (7)program (8)and (9)variant (10)100 (11)times. We (12)discard (13)the (14)first (15)20 (16)measurements (17)to (18)remove (19)noise (20)and (21)warm (22)up (23)the (24)JIT (25)engine. Thus, (26)for (27)each (28)program (29)and (30)variant, (31)we (32)collect (33)80 (34)execution (35)times. 199, (36)91,-50C5 (37)Dellg (38)eEXfliirdied (39)Wl (40)llme (41)£ (42)aNd (43)| (44)K (45)= (46)ky, (47)k»,...,ky (48)the (49)collection (50)of (51)correct (52)data (53)bytes, (54)the (55)Cabrera-Arteaga (56)et (57)al. Page (58)15 (59)of (60)25.
(0)We (1)collect (2)Metric (3)5 (4)after (5)running (6)each (7)program (8)and (9)variant (10)100 (11)times. We (12)discard (13)the (14)first (15)20 (16)measurements (17)to (18)remove (19)noise (20)and (21)warm (22)up (23)the (24)JIT (25)engine. Thus, (26)for (27)each (28)program (29)and (30)variant, (31)we (32)collect (33)80 (34)execution (35)times. (36)199, (37)91,--50C5 (38)Dellg (39)eEXfliirdied (40)Wl (41)llme (42)£ (43)aNd (44)| (45)K (46)= (47)ky, (48)k»,...,ky (49)the (50)collection (51)of (52)correct (53)data (54)bytes, (55)the (56)Cabrera-Arteaga (57)et (58)al. (59)Page (60)15 (61)of (62)25
,.
Put a space after the comma.
We collect Metric 5 after running each program and variant 100 times. We discard the first 20 measurements to remove noise and warm up the JIT engine. Thus, for each program and variant, we collect 80 execution times. 199, 91,--50C5 Dellg eEXfliirdied Wl llme £ aNd | K = ky, k»,...,ky the collection of correct data bytes, the Cabrera-Arteaga et al. Page 15 of 25
insert '' by '('
(0)5. Experimental (1)Results (2)(Experimental (3)Results) (4)- (5)Experimental (6)Results (7)(Experimental (8)Results) (9)- (10)Experimental (11)Results (12)(Experimental (13)Results) (14)- (15)Experimental (16)Results (17)(Experimental (18)Results) (19)- (20)Experimental (21)Results (22)(Experimental (23)Results) (24)- (25)Experimental (26)Results (27)(Experimental (28)Results) (29)- (30)Experimental (31)Results (32)(Experimental (33)Results) (34)- (35)Experimental (36)Results (37)(Experimental (38)Results) (39)- (40)Experimental (41)Results (42)(Experimental (43)Results) (44)- (45)Experimental (46)Results (47)(Experimental (48)Results) (49)- (50)Experimental (51)Results (52)(Experimental (53)Results) (54)- (55)Experimental (56)Results (57)(
(0)5. Experimental (1)Results
insert '' by '-'
(0)5. Experimental (1)Results (2)(Experimental (3)Results) (4)- (5)Experimental (6)Results (7)(Experimental (8)Results) (9)- (10)Experimental (11)Results (12)(Experimental (13)Results) (14)- (15)Experimental (16)Results (17)(Experimental (18)Results) (19)- (20)Experimental (21)Results (22)(Experimental (23)Results) (24)- (25)Experimental (26)Results (27)(Experimental (28)Results) (29)- (30)Experimental (31)Results (32)(Experimental (33)Results) (34)- (35)Experimental (36)Results (37)(Experimental (38)Results) (39)- (40)Experimental (41)Results (42)(Experimental (43)Results) (44)- (45)Experimental (46)Results (47)(Experimental (48)Results) (49)- (50)Experimental (51)Results (52)(Experimental (53)Results) (54)- (55)Experimental (56)Results (57)(
(0)5. Experimental (1)Results
insert '' by 'Results)'
(0)5. Experimental (1)Results (2)(Experimental (3)Results) (4)- (5)Experimental (6)Results (7)(Experimental (8)Results) (9)- (10)Experimental (11)Results (12)(Experimental (13)Results) (14)- (15)Experimental (16)Results (17)(Experimental (18)Results) (19)- (20)Experimental (21)Results (22)(Experimental (23)Results) (24)- (25)Experimental (26)Results (27)(Experimental (28)Results) (29)- (30)Experimental (31)Results (32)(Experimental (33)Results) (34)- (35)Experimental (36)Results (37)(Experimental (38)Results) (39)- (40)Experimental (41)Results (42)(Experimental (43)Results) (44)- (45)Experimental (46)Results (47)(Experimental (48)Results) (49)- (50)Experimental (51)Results (52)(Experimental (53)Results) (54)- (55)Experimental (56)Results (57)(
(0)5. Experimental (1)Results
insert '' by '(Experimental'
(0)5. Experimental (1)Results (2)(Experimental (3)Results) (4)- (5)Experimental (6)Results (7)(Experimental (8)Results) (9)- (10)Experimental (11)Results (12)(Experimental (13)Results) (14)- (15)Experimental (16)Results (17)(Experimental (18)Results) (19)- (20)Experimental (21)Results (22)(Experimental (23)Results) (24)- (25)Experimental (26)Results (27)(Experimental (28)Results) (29)- (30)Experimental (31)Results (32)(Experimental (33)Results) (34)- (35)Experimental (36)Results (37)(Experimental (38)Results) (39)- (40)Experimental (41)Results (42)(Experimental (43)Results) (44)- (45)Experimental (46)Results (47)(Experimental (48)Results) (49)- (50)Experimental (51)Results (52)(Experimental (53)Results) (54)- (55)Experimental (56)Results (57)(
(0)5. Experimental (1)Results
insert '' by 'Results'
(0)5. Experimental (1)Results (2)(Experimental (3)Results) (4)- (5)Experimental (6)Results (7)(Experimental (8)Results) (9)- (10)Experimental (11)Results (12)(Experimental (13)Results) (14)- (15)Experimental (16)Results (17)(Experimental (18)Results) (19)- (20)Experimental (21)Results (22)(Experimental (23)Results) (24)- (25)Experimental (26)Results (27)(Experimental (28)Results) (29)- (30)Experimental (31)Results (32)(Experimental (33)Results) (34)- (35)Experimental (36)Results (37)(Experimental (38)Results) (39)- (40)Experimental (41)Results (42)(Experimental (43)Results) (44)- (45)Experimental (46)Results (47)(Experimental (48)Results) (49)- (50)Experimental (51)Results (52)(Experimental (53)Results) (54)- (55)Experimental (56)Results (57)(
(0)5. Experimental (1)Results
insert '' by 'Experimental'
(0)5. Experimental (1)Results (2)(Experimental (3)Results) (4)- (5)Experimental (6)Results (7)(Experimental (8)Results) (9)- (10)Experimental (11)Results (12)(Experimental (13)Results) (14)- (15)Experimental (16)Results (17)(Experimental (18)Results) (19)- (20)Experimental (21)Results (22)(Experimental (23)Results) (24)- (25)Experimental (26)Results (27)(Experimental (28)Results) (29)- (30)Experimental (31)Results (32)(Experimental (33)Results) (34)- (35)Experimental (36)Results (37)(Experimental (38)Results) (39)- (40)Experimental (41)Results (42)(Experimental (43)Results) (44)- (45)Experimental (46)Results (47)(Experimental (48)Results) (49)- (50)Experimental (51)Results (52)(Experimental (53)Results) (54)- (55)Experimental (56)Results (57)(
(0)5. Experimental (1)Results
T
replace 'T' by 'T.'
(0)b; (1)such (2)that (3)b; (4)€ (5)K| (6)T.
(0)|b; (1)such (2)that (3)b; (4)€ (5)K| (6)T
|b;
replace '|b;' by 'b;'
(0)b; (1)such (2)that (3)b; (4)€ (5)K| (6)T.
(0)|b; (1)such (2)that (3)b; (4)€ (5)K| (6)T
insert '' by 'The'
(0)The (1)bandwidth (2)metric (3)is (4)defined (5)as:
(0)bandwidth (1)metric (2)is (3)defined (4)as:
bandwidth
This sentence does not start with an uppercase letter.
bandwidth metric is defined as:
popula-tion
replace 'popula-tion' by 'population'
(0)We (1)have (2)observed (3)a (4)significant (5)variation (6)in (7)the (8)population (9)size (10)out (11)of (12)WASM-MUTATE (13)between (14)different (15)programs, (16)ranging (17)by (18)several (19)thousand (20)variants (21)(from (22)a (23)maximum (24)of (25)53816 (26)variants (27)to (28)a (29)minimum (30)of (31)5716 (32)variants). This (33)disparity (34)is (35)attributed (36)to: (37)the (38)non-deterministic (39)nature (40)of (41)WASM-MUTATE (42)and (43)2) (44)the (45)characteristics (46)of (47)the (48)program. WASM-MUTATE (49)mutates (50)a (51)randomly (52)selected (53)portion (54)of (55)a (56)program. If (57)the (58)selected (59)instruction (60)is (61)determined (62)to (63)be (64)non-deterministic, (65)despite (66)the (67)transformation (68)being (69)semantically (70)equivalent, (71)WASM-MUTATE (72)discards (73)the (74)variant (75)and (76)moves (77)on (78)to (79)another (80)random (81)transformation. For (82)instance, (83)if (84)the (85)instruction (86)targeted (87)for (88)mutation (89)is (90)a (91)function (92)call, (93)WASM-MUTATE (94)proceeds (95)to (96)the (97)next (98)one. This (99)process, (100)in (101)conjunction (102)with (103)the (104)unique (105)characteristics (106)of (107)each (108)program, (109)results (110)in (111)a (112)varying (113)population (114)size. For (115)example, (116)an (117)input (118)binary (119)with (120)a (121)high (122)number (123)of (124)function (125)calls (126)would (127)lead (128)to (129)a (130)greater (131)number (132)of (133)trials (134)and (135)errors, (136)slowing (137)down (138)the (139)generation (140)of (141)variants, (142)thereby (143)resulting (144)in (145)a (146)smaller (147)overall (148)population (149)size (150)for (151)1 (152)hour (153)of (154)WASM-MUTATE (155)execution.
(0)We (1)have (2)observed (3)a (4)significant (5)variation (6)in (7)the (8)popula-tion (9)size (10)out (11)of (12)WASM-MUTATE (13)between (14)different (15)programs, (16)ranging (17)by (18)several (19)thousand (20)variants (21)(from (22)a (23)maximum (24)of (25)53816 (26)variants (27)to (28)a (29)minimum (30)of (31)5716 (32)variants). This (33)disparity (34)is (35)attributed (36)to: (37)the (38)non-deterministic (39)nature (40)of (41)WASM-MUTATE (42)and (43)2) (44)the (45)characteristics (46)of (47)the (48)program. (49)WASM-MUTATE (50)mutates (51)a (52)randomly (53)selected (54)portion (55)of (56)a (57)program. If (58)the (59)selected (60)instruction (61)is (62)determined (63)to (64)be (65)non-deterministic, (66)despite (67)the (68)transformation (69)being (70)semantically (71)equivalent, (72)WASM-MUTATE (73)discards (74)the (75)variant (76)and (77)moves (78)on (79)to (80)another (81)random (82)transformation. For (83)instance, (84)if (85)the (86)instruction (87)targeted (88)for (89)mutation (90)is (91)a (92)function (93)call, (94)WASM-MUTATE (95)proceeds (96)to (97)the (98)next (99)one. This (100)process, (101)in (102)conjunction (103)with (104)the (105)unique (106)characteristics (107)of (108)each (109)program, (110)results (111)in (112)a (113)varying (114)population (115)size. For (116)example, (117)an (118)input (119)binary (120)with (121)a (122)high (123)number (124)of (125)function (126)calls (127)would (128)lead (129)to (130)a (131)greater (132)number (133)of (134)trials (135)and (136)errors, (137)slowing (138)down (139)the (140)generation (141)of (142)variants, (143)thereby (144)resulting (145)in (146)a (147)smaller (148)overall (149)population (150)size (151)for (152)1 (153)hour (154)of (155)WASM-MUTATE (156)execution.
50000
replace '50000' by '50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000'
(0)50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000.50000
(0)50000
a8eyueo1eg
replace 'a8eyueo1eg' by 'a8eyueo1eg.'
(0)oO (1)aa (2)N (3)So (4)suoyefndod (5)urersoid (6)jo (7)a8eyueo1eg.
(0)oO (1)aa (2)N (3)So (4)suoyefndod (5)urersoid (6)jo (7)a8eyueo1eg
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)16 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)16 (5)of (6)25
100%
replace '100%' by '100%.'
(0)To (1)answer (2)the (3)question (4)RQ2, (5)we (6)measure (7)how (8)long (9)it (10)takes (11)to (12)generate (13)one (14)variant (15)that (16)exhibits (17)execution (18)traces (19)that (20)are (21)different (22)from (23)the (24)original. In (25)Figure (26)7, (27)we (28)display (29)a (30)cumulative (31)distribution (32)plot (33)showing (34)the (35)time (36)required (37)for (38)WASM-MUTATE (39)to (40)generate (41)variants (42)with (43)different (44)traces, (45)in (46)blue (47)for (48)machine (49)code (50)instructions (51)and (52)green (53)for (54)memory (55)traces. The (56)X-axis (57)marks (58)time (59)in (60)minutes, (61)and (62)the (63)Y-axis (64)shows (65)the (66)ratio (67)of (68)programs (69)from (70)303 (71)for (72)which (73)WASM-MUTATE (74)created (75)a (76)variant (77)within (78)that (79)time. For (80)all (81)original (82)programs, (83)WASM-MUTATE (84)succeeds (85)in (86)generating (87)one (88)variant (89)with (90)different (91)traces (92)compared (93)to (94)the (95)original (96)program, (97)either (98)in (99)machine (100)code (101)instructions (102)or (103)memory (104)access, (105)i.e., (106)both (107)cumulative (108)distributions (109)reach (110)100%. (111)The (112)shortest (113)time (114)to (115)generate (116)a (117)variant (118)with (119)different (120)machine (121)code (122)instruction (123)traces (124)is (125)0.12 (126)seconds, (127)and (128)for (129)different (130)memory (131)traces, (132)it (133)is (134)0.06 (135)seconds. In (136)the (137)slowest (138)scenarios, (139)WASM-MUTATE (140)takes (141)under (142)| (143)minute (144)for (145)different (146)machine (147)code (148)instruction (149)traces (150)and (151)less (152)than (153)3 (154)minutes (155)for (156)different (157)memory (158)traces. Overall, (159)WASM-MUTATE (160)takes (161)a (162)median (163)of (164)5.4 (165)seconds (166)and (167)12.6 (168)seconds (169)in (170)generating (171)variants (172)with (173)different (174)machine (175)code (176)instructions (177)and (178)different (179)memory (180)instructions (181)respectively.
(0)To (1)answer (2)question (3)RQ2, (4)we (5)measure (6)how (7)long (8)it (9)takes (10)to (11)generate (12)one (13)variant (14)that (15)exhibits (16)execution (17)traces (18)that (19)are (20)different (21)from (22)the (23)original. In (24)Figure (25)7, (26)we (27)display (28)a (29)cumulative (30)distribution (31)plot (32)showing (33)the (34)time (35)required (36)for (37)WASM-MUTATE (38)to (39)generate (40)variants (41)with (42)different (43)traces, (44)in (45)blue (46)for (47)machine (48)code (49)instructions (50)and (51)green (52)for (53)memory (54)traces. The (55)X-axis (56)marks (57)time (58)in (59)minutes, (60)and (61)the (62)Y-axis (63)shows (64)the (65)ratio (66)of (67)programs (68)from (69)303 (70)for (71)which (72)WASM-MUTATE (73)created (74)a (75)variant (76)within (77)that (78)time. For (79)all (80)original (81)programs, (82)WASM-MUTATE (83)succeeds (84)in (85)generating (86)one (87)variant (88)with (89)different (90)traces (91)compared (92)to (93)the (94)original (95)program, (96)either (97)in (98)machine (99)code (100)instructions (101)or (102)memory (103)access, (104)i.e., (105)both (106)cumulative (107)distributions (108)reach (109)100% (110)The (111)shortest (112)time (113)to (114)generate (115)a (116)variant (117)with (118)different (119)machine (120)code (121)instruction (122)traces (123)is (124)0.12 (125)seconds, (126)and (127)for (128)different (129)memory (130)traces, (131)it (132)is (133)0.06 (134)seconds. In (135)the (136)slowest (137)scenarios, (138)WASM-MUTATE (139)takes (140)under (141)| (142)minute (143)for (144)different (145)machine (146)code (147)instruction (148)traces (149)and (150)less (151)than (152)3 (153)minutes (154)for (155)different (156)memory (157)traces. Overall, (158)WASM-MUTATE (159)takes (160)a (161)median (162)of (163)5.4 (164)seconds (165)and (166)12.6 (167)seconds (168)in (169)generating (170)variants (171)with (172)different (173)machine (174)code (175)instructions (176)and (177)different (178)memory (179)instructions (180)respectively.
insert '' by 'the'
(0)To (1)answer (2)the (3)question (4)RQ2, (5)we (6)measure (7)how (8)long (9)it (10)takes (11)to (12)generate (13)one (14)variant (15)that (16)exhibits (17)execution (18)traces (19)that (20)are (21)different (22)from (23)the (24)original. In (25)Figure (26)7, (27)we (28)display (29)a (30)cumulative (31)distribution (32)plot (33)showing (34)the (35)time (36)required (37)for (38)WASM-MUTATE (39)to (40)generate (41)variants (42)with (43)different (44)traces, (45)in (46)blue (47)for (48)machine (49)code (50)instructions (51)and (52)green (53)for (54)memory (55)traces. The (56)X-axis (57)marks (58)time (59)in (60)minutes, (61)and (62)the (63)Y-axis (64)shows (65)the (66)ratio (67)of (68)programs (69)from (70)303 (71)for (72)which (73)WASM-MUTATE (74)created (75)a (76)variant (77)within (78)that (79)time. For (80)all (81)original (82)programs, (83)WASM-MUTATE (84)succeeds (85)in (86)generating (87)one (88)variant (89)with (90)different (91)traces (92)compared (93)to (94)the (95)original (96)program, (97)either (98)in (99)machine (100)code (101)instructions (102)or (103)memory (104)access, (105)i.e., (106)both (107)cumulative (108)distributions (109)reach (110)100%. (111)The (112)shortest (113)time (114)to (115)generate (116)a (117)variant (118)with (119)different (120)machine (121)code (122)instruction (123)traces (124)is (125)0.12 (126)seconds, (127)and (128)for (129)different (130)memory (131)traces, (132)it (133)is (134)0.06 (135)seconds. In (136)the (137)slowest (138)scenarios, (139)WASM-MUTATE (140)takes (141)under (142)| (143)minute (144)for (145)different (146)machine (147)code (148)instruction (149)traces (150)and (151)less (152)than (153)3 (154)minutes (155)for (156)different (157)memory (158)traces. Overall, (159)WASM-MUTATE (160)takes (161)a (162)median (163)of (164)5.4 (165)seconds (166)and (167)12.6 (168)seconds (169)in (170)generating (171)variants (172)with (173)different (174)machine (175)code (176)instructions (177)and (178)different (179)memory (180)instructions (181)respectively.
(0)To (1)answer (2)question (3)RQ2, (4)we (5)measure (6)how (7)long (8)it (9)takes (10)to (11)generate (12)one (13)variant (14)that (15)exhibits (16)execution (17)traces (18)that (19)are (20)different (21)from (22)the (23)original. In (24)Figure (25)7, (26)we (27)display (28)a (29)cumulative (30)distribution (31)plot (32)showing (33)the (34)time (35)required (36)for (37)WASM-MUTATE (38)to (39)generate (40)variants (41)with (42)different (43)traces, (44)in (45)blue (46)for (47)machine (48)code (49)instructions (50)and (51)green (52)for (53)memory (54)traces. The (55)X-axis (56)marks (57)time (58)in (59)minutes, (60)and (61)the (62)Y-axis (63)shows (64)the (65)ratio (66)of (67)programs (68)from (69)303 (70)for (71)which (72)WASM-MUTATE (73)created (74)a (75)variant (76)within (77)that (78)time. For (79)all (80)original (81)programs, (82)WASM-MUTATE (83)succeeds (84)in (85)generating (86)one (87)variant (88)with (89)different (90)traces (91)compared (92)to (93)the (94)original (95)program, (96)either (97)in (98)machine (99)code (100)instructions (101)or (102)memory (103)access, (104)i.e., (105)both (106)cumulative (107)distributions (108)reach (109)100% (110)The (111)shortest (112)time (113)to (114)generate (115)a (116)variant (117)with (118)different (119)machine (120)code (121)instruction (122)traces (123)is (124)0.12 (125)seconds, (126)and (127)for (128)different (129)memory (130)traces, (131)it (132)is (133)0.06 (134)seconds. In (135)the (136)slowest (137)scenarios, (138)WASM-MUTATE (139)takes (140)under (141)| (142)minute (143)for (144)different (145)machine (146)code (147)instruction (148)traces (149)and (150)less (151)than (152)3 (153)minutes (154)for (155)different (156)memory (157)traces. Overall, (158)WASM-MUTATE (159)takes (160)a (161)median (162)of (163)5.4 (164)seconds (165)and (166)12.6 (167)seconds (168)in (169)generating (170)variants (171)with (172)different (173)machine (174)code (175)instructions (176)and (177)different (178)memory (179)instructions (180)respectively.
the
delete 'the' by ''
(0)Answer (1)to (2)RQ1: (3)WASM-MUTATE (4)generates (5)Web-Assembly (6)variants (7)for (8)all (9)303 (10)input (11)programs. Within (12)a (13)one-hour (14)diversification (15)budget, (16)WASM-MUTATE (17)synthesizes (18)more (19)than (20)9000 (21)unique (22)variants (23)per (24)program (25)on (26)average. 62% (27)of (28)the (29)variants (30)remain (31)different (32)after (33)machine-code (34)compilation. _WASM-MUTATE (35)is (36)good (37)at (38)producing (39)many (40)WebAssembly (41)program (42)variants.
(0)Answer (1)to (2)RQ1: (3)WASM-MUTATE (4)generates (5)Web-Assembly (6)variants (7)for (8)all (9)the (10)303 (11)input (12)programs. (13)Within (14)a (15)one-hour (16)diversification (17)budget, (18)WASM-MUTATE (19)synthesizes (20)more (21)than (22)9000 (23)unique (24)variants (25)per (26)program (27)on (28)average. 62% (29)of (30)the (31)variants (32)remain (33)different (34)after (35)machine-code (36)compilation. _WASM-MUTATE (37)is (38)good (39)at (40)producing (41)many (42)WebAssembly (43)program (44)variants.
insert '' by '2.5.'
(0)— (1)Until (2)diff. Instruction (3)—— (4)Until (5)diff. Mem (6)access (7)1.0 (8)1.5 (9)2.0 (10)2.5 (11)2.5.
(0)— (1)Until (2)diff. instruction (3)—— (4)Until (5)diff. mem (6)access (7)1.0 (8)1.5 (9)2.0 (10)2.5
mem
replace 'mem' by 'Mem'
(0)— (1)Until (2)diff. Instruction (3)—— (4)Until (5)diff. Mem (6)access (7)1.0 (8)1.5 (9)2.0 (10)2.5 (11)2.5.
(0)— (1)Until (2)diff. instruction (3)—— (4)Until (5)diff. mem (6)access (7)1.0 (8)1.5 (9)2.0 (10)2.5
instruction
replace 'instruction' by 'Instruction'
(0)— (1)Until (2)diff. Instruction (3)—— (4)Until (5)diff. Mem (6)access (7)1.0 (8)1.5 (9)2.0 (10)2.5 (11)2.5.
(0)— (1)Until (2)diff. instruction (3)—— (4)Until (5)diff. mem (6)access (7)1.0 (8)1.5 (9)2.0 (10)2.5
instruction
This sentence does not start with an uppercase letter.
— Until diff. instruction —— Until diff. mem access 1.0 1.5 2.0 2.5
2.5
replace '2.5' by '2.5.'
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5
2.0
replace '2.0' by '2.5'
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5
1.5
replace '1.5' by '2.0'
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5
1.0
replace '1.0' by '1.5'
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5
0.5
replace '0.5' by '1.0'
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5
0.0
replace '0.0' by '0.5'
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5
1
replace '1' by '0.0'
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5
r
replace 'r' by '1'
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5
insert '' by 'r'
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5
mem
replace 'mem' by 'Mem'
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5
instruction
replace 'instruction' by 'Instruction'
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. Instruction (9)— (10)Until (11)diff. Mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5 (25)2.5.
(0)Cumulative (1)distribution (2)1.00 (3)0.75 (4)0.50 (5)0.25 (6)— (7)Until (8)diff. instruction (9)— (10)Until (11)diff. mem (12)access (13)0.00 (14)1 (15)r (16)r (17)1 (18)1 (19)0.0 (20)0.5 (21)1.0 (22)1.5 (23)2.0 (24)2.5
instruction
This sentence does not start with an uppercase letter.
Cumulative distribution 1.00 0.75 0.50 0.25 — Until diff. instruction — Until diff. mem access 0.00 1 r r 1 1 0.0 0.5 1.0 1.5 2.0 2.5
gen-eration
replace 'gen-eration' by 'generation'
(0)The (1)use (2)of (3)an (4)e-graph (5)random (6)traversal (7)is (8)the (9)key (10)factor (11)for (12)such (13)a (14)fast (15)generation (16)process. Once (17)WASM-MUTATE (18)locates (19)a (20)modifiable (21)instruction (22)within (23)the (24)binary (25)and (26)constructs (27)its (28)corresponding (29)e-graph, (30)traversal (31)is (32)virtually (33)instantaneous. However, (34)the (35)time (36)efficiency (37)of (38)variant (39)generation (40)is (41)not (42)consistent (43)across (44)all (45)programs, (46)as (47)illustrated (48)in (49)Figure (50)7. This (51)variation (52)primarily (53)stems (54)from (55)the (56)varying (57)complexities (58)of (59)the (60)programs (61)under (62)analysis, (63)as (64)previously (65)mentioned (66)in (67)subsection (68)5.1. Interestingly, (69)WASM-MUTATE (70)may (71)attempt (72)to (73)build (74)e-graphs (75)from (76)instructions (77)that, (78)while (79)not (80)inherently (81)leading (82)to (83)undefined (84)behavior, (85)are (86)part (87)of (88)a (89)data (90)flow (91)graph (92)that (93)could. For (94)example, (95)the (96)data (97)flow (98)graph (99)might (100)be (101)dependent (102)on (103)a (104)function (105)call. Although (106)transforming (107)undefined (108)behavioral (109)instructions (110)is (111)deactivated (112)by (113)default (114)in (115)WASM-MUTATE (116)to (117)maintain (118)functional (119)equivalence (120)with (121)the (122)original (123)code, (124)the (125)process (126)of (127)attempting (128)to (129)construct (130)such (131)e-graphs (132)can (133)extend (134)the (135)duration (136)of (137)the (138)diversification (139)pass. As (140)a (141)result, (142)WASM-MUTATE (143)may (144)require (145)multiple (146)attempts (147)to (148)successfully (149)create (150)and (151)traverse (152)an (153)e-graph, (154)impacting (155)the (156)rate (157)at (158)which (159)it (160)generates (161)behaviorally (162)distinct (163)variants. This (164)phenomenon (165)is (166)particularly (167)noticeable (168)in (169)original (170)programs (171)that (172)have (173)a (174)high (175)frequency (176)of (177)function (178)calls.
(0)The (1)use (2)of (3)an (4)e-graph (5)random (6)traversal (7)is (8)the (9)key (10)factor (11)for (12)such (13)a (14)fast (15)generation (16)process. Once (17)WASM-MUTATE (18)locates (19)a (20)modifiable (21)instruction (22)within (23)the (24)binary (25)and (26)constructs (27)its (28)corresponding (29)e-graph, (30)traversal (31)is (32)virtually (33)instantaneous. However, (34)the (35)time (36)efficiency (37)of (38)variant (39)gen-eration (40)is (41)not (42)consistent (43)across (44)all (45)programs, (46)as (47)illustrated (48)in (49)Figure (50)7. This (51)variation (52)primarily (53)stems (54)from (55)the (56)varying (57)complexities (58)of (59)the (60)programs (61)under (62)analysis, (63)as (64)previously (65)mentioned (66)in (67)subsection (68)5.1. Interestingly, (69)WASM-MUTATE (70)may (71)attempt (72)to (73)build (74)e-graphs (75)from (76)instructions (77)that, (78)while (79)not (80)inherently (81)leading (82)to (83)undefined (84)behavior, (85)are (86)part (87)of (88)a (89)data (90)flow (91)graph (92)that (93)could. For (94)example, (95)the (96)data (97)flow (98)graph (99)might (100)be (101)dependent (102)on (103)a (104)function (105)call. (106)Although (107)transforming (108)undefined (109)behavioral (110)instructions (111)is (112)deactivated (113)by (114)default (115)in (116)WASM-MUTATE (117)to (118)maintain (119)functional (120)equivalence (121)with (122)the (123)original (124)code, (125)the (126)process (127)of (128)attempting (129)to (130)construct (131)such (132)e-graphs (133)can (134)extend (135)the (136)duration (137)of (138)the (139)diversification (140)pass. As (141)a (142)result, (143)WASM-MUTATE (144)may (145)require (146)multiple (147)attempts (148)to (149)successfully (150)create (151)and (152)traverse (153)an (154)e-graph, (155)impacting (156)the (157)rate (158)at (159)which (160)it (161)generates (162)behaviorally (163)distinct (164)variants. This (165)phenomenon (166)is (167)particularly (168)noticeable (169)in (170)original (171)programs (172)that (173)have (174)a (175)high (176)frequency (177)of (178)function (179)calls.
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)17 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)17 (5)of (6)25
syed
delete 'syed' by ''
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed
yunos
replace 'yunos' by 'syed.'
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed
“.
replace '“.' by 'Yaunos'
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed
o
replace 'o' by '“.'
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed
st
replace 'st' by 'o'
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed
=
replace '=' by 'st'
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed
x
replace 'x' by '='
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed
S
replace 'S' by 'x'
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed
So
replace 'So' by 'S'
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed
s
replace 's' by 'So'
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed
S
replace 'S' by 's'
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed
insert '' by 'S'
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. Yaunos (14)syed.
(0)T (1)' (2): (3)SS (4)S (5)S (6)s (7)So (8)S (9)x (10)= (11)st (12)o (13)“. (14)yunos (15)syed
'
Don’t put a space on both sides of a quote symbol.
T ' : SS S S s So S x = st o “. yunos syed
distribution
replace 'distribution' by 'distribution.'
(0)Relative (1)execution (2)time (3)distribution.
(0)Relative (1)execution (2)time (3)distribution
syueLre,,
replace 'syueLre,,' by 'syueLre,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,'
(0)Yunoo (1)syueLre,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
(0)yunoo (1)syueLre,,
yunoo
replace 'yunoo' by 'Yunoo'
(0)Yunoo (1)syueLre,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
(0)yunoo (1)syueLre,,
~
replace '~' by '.'
(0)200 (1).
(0)200 (1)~
distribution
replace 'distribution' by 'distribution.'
(0)Relative (1)machine (2)code (3)size (4)distribution.
(0)Relative (1)machine (2)code (3)size (4)distribution
com-ponent
replace 'com-ponent' by 'component'
(0)We (1)have (2)identified (3)four (4)primary (5)factors (6)explaining (7)why (8)execution (9)traces (10)differ (11)overall. First, (12)alterations (13)to (14)the (15)binary (16)layout (17)inherently (18)impact (19)both (20)machine (21)code (22)instruction (23)traces (24)and (25)memory (26)accesses (27)within (28)the (29)program’s (30)stack. In (31)particular, (32)WASM-MUTATE (33)creates (34)variants (35)that (36)change (37)the (38)return (39)addresses (40)of (41)functions, (42)leading (43)to (44)divergent (45)execution (46)traces, (47)including (48)those (49)related (50)to (51)memory (52)access. Second, (53)our (54)rewriting (55)rules (56)incorporate (57)artificial (58)global (59)values (60)into (61)WebAssembly (62)binaries. Since (63)these (64)global (65)variables (66)are (67)inherently (68)manipulated (69)via (70)the (71)stack, (72)their (73)access (74)inevitably (75)generates (76)divergent (77)memory (78)traces. Third, (79)WASM-MUTATE (80)injects (81)*phantom’ (82)instructions (83)which (84)do (85)not (86)aim (87)to (88)modify (89)the (90)outcome (91)of (92)a (93)transformed (94)function (95)during (96)execution. These (97)intermediate (98)calculations (99)trigger (100)the (101)spill/reload (102)component (103)of (104)the (105)runtime, (106)varying (107)spill (108)and (109)reload (110)operations. In (111)the (112)context (113)of (114)limited (115)physical (116)resources, (117)these (118)operations (119)temporarily (120)store (121)values (122)in (123)memory (124)for (125)later (126)retrieval (127)and (128)use, (129)thus (130)creating (131)unique (132)memory (133)traces. Finally, (134)certain (135)rewriting (136)rules (137)implemented (138)by (139)WASM-MUTATE (140)replicate (141)fragments (142)of (143)code, (144)e.g., (145)performing (146)commutative (147)operations. These (148)code (149)segments (150)may (151)contain (152)memory (153)accesses, (154)and (155)while (156)neither (157)the (158)memory (159)addresses (160)nor (161)their (162)values (163)change, (164)the (165)frequency (166)of (167)these (168)operations (169)does. Overall, (170)these (171)findings (172)influence (173)the (174)diversity (175)of (176)execution (177)traces (178)among (179)the (180)generated (181)variants.
(0)We (1)have (2)identified (3)four (4)primary (5)factors (6)explaining (7)why (8)execution (9)traces (10)differ (11)overall. First, (12)alterations (13)to (14)the (15)binary (16)layout (17)inherently (18)impact (19)both (20)machine (21)code (22)instruction (23)traces (24)and (25)memory (26)accesses (27)within (28)the (29)program’s (30)stack. In (31)particular, (32)WASM-MUTATE (33)creates (34)variants (35)that (36)change (37)the (38)return (39)addresses (40)of (41)functions, (42)leading (43)to (44)divergent (45)execution (46)traces, (47)including (48)those (49)related (50)to (51)memory (52)access. Second, (53)our (54)rewriting (55)rules (56)incorporate (57)artificial (58)global (59)values (60)into (61)WebAssembly (62)binaries. Since (63)these (64)global (65)variables (66)are (67)inherently (68)manipulated (69)via (70)the (71)stack, (72)their (73)access (74)inevitably (75)generates (76)divergent (77)memory (78)traces. Third, (79)WASM-MUTATE (80)injects (81)*phantom’ (82)instructions (83)which (84)do (85)not (86)aim (87)to (88)modify (89)the (90)outcome (91)of (92)a (93)transformed (94)function (95)during (96)execution. (97)These (98)intermediate (99)calculations (100)trigger (101)the (102)spill/reload (103)com-ponent (104)of (105)the (106)runtime, (107)varying (108)spill (109)and (110)reload (111)operations. In (112)the (113)context (114)of (115)limited (116)physical (117)resources, (118)these (119)operations (120)temporarily (121)store (122)values (123)in (124)memory (125)for (126)later (127)retrieval (128)and (129)use, (130)thus (131)creating (132)unique (133)memory (134)traces. Finally, (135)certain (136)rewriting (137)rules (138)implemented (139)by (140)WASM-MUTATE (141)replicate (142)fragments (143)of (144)code, (145)e.g., (146)performing (147)commutative (148)operations. (149)These (150)code (151)segments (152)may (153)contain (154)memory (155)accesses, (156)and (157)while (158)neither (159)the (160)memory (161)addresses (162)nor (163)their (164)values (165)change, (166)the (167)frequency (168)of (169)these (170)operations (171)does. Overall, (172)these (173)findings (174)influence (175)the (176)diversity (177)of (178)execution (179)traces (180)among (181)the (182)generated (183)variants.
’
Unpaired symbol: ‘‘’ seems to be missing
We have identified four primary factors explaining why execution traces differ overall. First, alterations to the binary layout inherently impact both machine code instruction traces and memory accesses within the program’s stack. In particular, WASM-MUTATE creates variants that change the return addresses of functions, leading to divergent execution traces, including those related to memory access. Second, our rewriting rules incorporate artificial global values into WebAssembly binaries. Since these global variables are inherently manipulated via the stack, their access inevitably generates divergent memory traces. Third, WASM-MUTATE injects *phantom’ instructions which do not aim to modify the outcome of a transformed function during execution. These intermediate calculations trigger the spill/reload com-ponent of the runtime, varying spill and reload operations. In the context of limited physical resources, these operations temporarily store values in memory for later retrieval and use, thus creating unique memory traces. Finally, certain rewriting rules implemented by WASM-MUTATE replicate fragments of code, e.g., performing commutative operations. These code segments may contain memory accesses, and while neither the memory addresses nor their values change, the frequency of these operations does. Overall, these findings influence the diversity of execution traces among the generated variants.
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)18 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)18 (5)of (6)25
ret2spec
Possible typo detected.
For btb_breakout and btb_leakage, WASM-MUTATE demonstrates effectiveness, generating variants that leak less information than the original in 78% and 70% of the cases, respectively. For these particular binaries, a significant reduction in exfiltration bandwidth to zero is noted after 200 stacked transformations. This means that with a minimum of 200 stacked transformations, WASM-MUTATE can create variants that are completely resistant to the original attack. For the ret2spec and pht scenarios, the produced variants consistently exhibit lower bandwidth than the original in 76% and 71% of instances, respectively. As depicted in the plots, the exfiltration bandwidth diminishes following the application of at least 100 stacked transformations.
ret2spec
Possible typo detected.
Figure 10 offers a graphical representation of WASM-MUTATE’s influence on the Swivel original programs and their attacks. Each plot corresponds to one original Web-Assembly binary and the attack it undergoes: btb_breakout, btb_leakage, ret2spec, and pht. The Y-axis represents the exfiltration bandwidth (see Metric 6). The bandwidth of the original binary under attack is marked as a blue dashed horizontal line. In each plot, the variants are grouped in clusters of 100 stacked transformations. These are indicated by green dots and lines. The dot signifies the median bandwidth for the cluster, while the line represents the interquartile range of the group’s bandwidth.
9
replace '9' by '9,'
(0)In (1)Figure (2)9, (3)we (4)show (5)the (6)distribution (7)of (8)relative (9)execution (10)times (11)for (12)variants (13)produced (14)by (15)WASM-MUTATE. The (16)Y-axis (17)represents (18)the (19)count (20)of (21)variants, (22)while (23)the (24)X-axis (25)represents (26)the (27)relative (28)value (29)of (30)the (31)relative (32)execution (33)time (34)size. The (35)median (36)relative (37)execution (38)time (39)is (40)1.1. Overall, (41)we (42)observe (43)a (44)Gaussian-like (45)shape. We (46)note (47)that (48)29% (49)of (50)the (51)variants (52)perform (53)faster (54)than (55)the (56)original, (57)in (58)contrast (59)to (60)70% (61)that (62)are (63)slightly (64)slower. In (65)the (66)worst-case (67)scenario, (68)WASM-MUTATE (69)produces (70)variants (71)that (72)perform (73)twice (74)as (75)slowly (76)as (77)the (78)original. On (79)the (80)other (81)hand, (82)in (83)the (84)best-case (85)scenario, (86)WASM-MUTATE (87)produces (88)variants (89)that (90)are (91)five (92)times (93)faster (94)than (95)the (96)original. We (97)have (98)identified (99)two (100)primary (101)reasons (102)for (103)the (104)minimal (105)impact (106)of (107)WASM-MUTATE (108)on (109)variant (110)execution (111)times. First, (112)WASM-MUTATE (113)generates (114)variants (115)by (116)injecting (117)phantom (118)code (119)which, (120)in (121)practice, (122)is (123)not (124)executed. This (125)impacts (126)the (127)machine (128)code (129)size, (130)but (131)not (132)the (133)execution (134)time. Second, (135)WASM-MUTATE (136)produces (137)variants (138)by (139)optimizing (140)the (141)original (142)programs, (143)in (144)particular, (145)due (146)to (147)peep-hole (148)diversification (149)techniques. This (150)allows (151)for (152)the (153)generation (154)of (155)faster (156)variants (157)through (158)the (159)stacking (160)of (161)optimizations (162)during (163)the (164)e-graph (165)traversal (166)by (167)WASM-MUTATE.
(0)In (1)Figure (2)9 (3)we (4)show (5)the (6)distribution (7)of (8)relative (9)execution (10)times (11)for (12)variants (13)produced (14)by (15)WASM-MUTATE. The (16)Y-axis (17)represents (18)the (19)count (20)of (21)variants, (22)while (23)the (24)X-axis (25)represents (26)the (27)relative (28)value (29)of (30)the (31)relative (32)execution (33)time (34)size. The (35)median (36)relative (37)execution (38)time (39)is (40)1.1. Overall, (41)we (42)observe (43)a (44)Gaussian-like (45)shape. We (46)note (47)that (48)29% (49)of (50)the (51)variants (52)perform (53)faster (54)than (55)the (56)original, (57)in (58)contrast (59)to (60)70% (61)that (62)are (63)slightly (64)slower. In (65)the (66)worst-case (67)scenario, (68)WASM-MUTATE (69)produces (70)variants (71)that (72)perform (73)twice (74)as (75)slowly (76)as (77)the (78)original. On (79)the (80)other (81)hand, (82)in (83)the (84)best-case (85)scenario, (86)WASM-MUTATE (87)produces (88)variants (89)that (90)are (91)five (92)times (93)faster (94)than (95)the (96)original. We (97)have (98)identified (99)two (100)primary (101)reasons (102)for (103)the (104)minimal (105)impact (106)of (107)WASM-MUTATE (108)on (109)variant (110)execution (111)times. First, (112)WASM-MUTATE (113)generates (114)variants (115)by (116)injecting (117)phantom (118)code (119)which, (120)in (121)practice, (122)is (123)not (124)executed. This (125)impacts (126)the (127)machine (128)code (129)size, (130)but (131)not (132)the (133)execution (134)time. Second, (135)WASM-MUTATE (136)produces (137)variants (138)by (139)optimizing (140)the (141)original (142)programs, (143)in (144)particular, (145)due (146)to (147)peep-hole (148)diversification (149)techniques. This (150)allows (151)for (152)the (153)generation (154)of (155)faster (156)variants (157)through (158)the (159)stacking (160)of (161)optimizations (162)during (163)the (164)e-graph (165)traversal (166)by (167)WASM-MUTATE.
Swivel’s
replace 'Swivel’s' by 'Swivel's'
(0)Figure (1)10: (2)Visual (3)representation (4)of (5)WASM-MUTATE's (6)impact (7)on (8)Swivel's (9)original (10)programs. The (11)Y-axis (12)denotes (13)exfiltration (14)bandwidth, (15)with (16)the (17)original (18)binary’s (19)bandwidth (20)under (21)attack (22)highlighted (23)by (24)a (25)blue (26)marker (27)and (28)dashed (29)line. Variants (30)are (31)clustered (32)in (33)groups (34)of (35)100 (36)stacked (37)transformations, (38)denoted (39)by (40)green (41)dots (42)(median (43)bandwidth) (44)and (45)lines (46)(interquartile (47)bandwidth (48)range). Overall, (49)for (50)all (51)100000 (52)variants (53)generated (54)out (55)of (56)each (57)original (58)program, (59)70% (60)have (61)less (62)data (63)leakage (64)bandwidth.
(0)Figure (1)10: (2)Visual (3)representation (4)of (5)WASM-MUTATE's (6)impact (7)on (8)Swivel’s (9)original (10)programs. The (11)Y-axis (12)denotes (13)exfiltration (14)bandwidth, (15)with (16)the (17)original (18)binary’s (19)bandwidth (20)under (21)attack (22)highlighted (23)by (24)a (25)blue (26)marker (27)and (28)dashed (29)line. Variants (30)are (31)clustered (32)in (33)groups (34)of (35)100 (36)stacked (37)transformations, (38)denoted (39)by (40)green (41)dots (42)(median (43)bandwidth) (44)and (45)lines (46)(interquartile (47)bandwidth (48)range). (49)Overall, (50)for (51)all (52)100000 (53)variants (54)generated (55)out (56)of (57)each (58)original (59)program, (60)70% (61)have (62)less (63)data (64)leakage (65)bandwidth.
transformations
replace 'transformations' by 'transformations.'
(0)(s/q) (1)Tapimpueg, (2)Stacked (3)transformations.
(0)(s/q) (1)Tapimpueg, (2)Stacked (3)transformations
(s
The word ‘(s’ is not standard English. Did you mean “’s” (curly apostrophe) or “'s” (straight apostrophe)?
(s/q) Tapimpueg, Stacked transformations
transformations
replace 'transformations' by 'transformations.'
(0)0.03 (1)a (2)So (3)Ss (4)(s/q) (5)Waprapueg (6)0.02 (7)0.00 (8)Stacked (9)transformations.
(0)0.03 (1)a (2)So (3)Ss (4)(s/q) (5)Waprapueg (6)0.02 (7)0.00 (8)Stacked (9)transformations
transformations
delete 'transformations' by ''
(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.
(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations
Stacked
delete 'Stacked' by ''
(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.
(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations
0.0
replace '0.0' by 'transformations.'
(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.
(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations
S
replace 'S' by 'Stacked'
(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.
(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations
a
replace 'a' by '0.0'
(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.
(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations
Tpmpueg
replace 'Tpmpueg' by 'S'
(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.
(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations
(s/q)
replace '(s/q)' by 'a'
(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.
(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations
Ss
replace 'Ss' by 'Tpmpueg'
(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.
(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations
~~
replace '~~' by '(s/q)'
(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.
(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations
insert '' by 'Ss'
(0)Bs (1)Ss (2) (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations.
(0)Bs (1)Ss (2)~~ (3)Ss (4)(s/q) (5)Tpmpueg (6)a (7)S (8)0.0 (9)Stacked (10)transformations
transformations
replace 'transformations' by 'transformations.'
(0)btb_leakage (1)Se (2)S (3)o (4)* (5)a (6)= (7)(s/q) (8)Waprnpueg (9)Stacked (10)transformations.
(0)btb_leakage (1)Se (2)S (3)o (4)* (5)a (6)= (7)(s/q) (8)Waprnpueg (9)Stacked (10)transformations
btb
This sentence does not start with an uppercase letter.
btb_leakage Se S o * a = (s/q) Waprnpueg Stacked transformations
insert '' by 'it.'
(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.
(0)
insert '' by 'for'
(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.
(0)
insert '' by 'need'
(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.
(0)
insert '' by 'a'
(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.
(0)
insert '' by 'is'
(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.
(0)
insert '' by 'there'
(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.
(0)
insert '' by 'not'
(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.
(0)
insert '' by 'or'
(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.
(0)
insert '' by 'whether'
(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.
(0)
insert '' by 'of'
(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.
(0)
insert '' by 'question'
(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.
(0)
insert '' by 'the'
(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.
(0)
insert '' by 'Then'
(0)Then (1)there (2)is (3)the (4)question (5)of (6)whether (7)or (8)not (9)there (10)is (11)a (12)need (13)for (14)it.
(0)
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)19 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)19 (5)of (6)25
optimization
replace 'optimization' by 'optimization.'
(0)Just (1)prevent (2)optimization.
(0)just (1)prevent (2)optimization
just
replace 'just' by 'Just'
(0)Just (1)prevent (2)optimization.
(0)just (1)prevent (2)optimization
replace ' (0)Variant (1)code (2)(call (3)$readTimer) (4)(set_local (5)$end_time) (6)inserted (7)instructions>.
Access (8)to (9)mem (10)inserted (11)instructions> (12)(i64.sub (13)(get_local (14)$end_time) (15)(get_local (16)$start_time)) (17)(set_local (18)$duration) (19)Listing (20)8: (21)Variant (22)of (23)btb_breakout (24)with (25)more (26)instructions (27)added (28)in (29)between (30)time (31)measurement.
(0)Variant (1)code (2)(call (3)$readTimer) (4)(set_local (5)$end_time) (6)Happy suggestion
Suggestions
access
replace 'access' by 'Access'
(0)Variant (1)code (2)(call (3)$readTimer) (4)(set_local (5)$end_time) (6)inserted (7)instructions>. Access (8)to (9)mem (10)inserted (11)instructions> (12)(i64.sub (13)(get_local (14)$end_time) (15)(get_local (16)$start_time)) (17)(set_local (18)$duration) (19)Listing (20)8: (21)Variant (22)of (23)btb_breakout (24)with (25)more (26)instructions (27)added (28)in (29)between (30)time (31)measurement.
(0)Variant (1)code (2)(call (3)$readTimer) (4)(set_local (5)$end_time) (6)
access
This sentence does not start with an uppercase letter.
Variant code (call $readTimer) (set_local $end_time)
secret
replace 'secret' by 'secret.'
(0)"S"(83) (1)is (2)the (3)secret.
(0)"S"(83) (1)is (2)the (3)secret
"S
The word ‘"S’ is not standard English. Did you mean “’S” (curly apostrophe) or “'S” (straight apostrophe)?
"S"(83) is the secret
places.
delete 'places.' by ''
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)
jump
delete 'jump' by ''
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)
between
delete 'between' by ''
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)
indindinctly
delete 'indindinctly' by ''
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)
added
delete 'added' by ''
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)
instructions
delete 'instructions' by ''
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)
more
delete 'more' by ''
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)
with
delete 'with' by ''
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)
btb_breakout
delete 'btb_breakout' by ''
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)
of
delete 'of' by ''
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)
Variant
delete 'Variant' by ''
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)
replace ' (0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)inserted (11)instructions> (12)(132.load (13)(i32.const (14)2000)) (15)inserted (16)instructions> (17)(i32.store (18)(i32.const (19)83)) (20)just (21)prevent (22)optimization (23)transiently (24)jump (25)here (26)inserted (27)instructions> (28)(132.load (29)(i32.const (30)339968)) (31)"S"(83) (32)is (33)the (34)secret (35)inserted (36)instructions> (37)(i32.store (38)(i32.const (39)83)) (40)just (41)prevent (42)optimization (43)Listing (44)10:
(0)Variant (1)code (2)train (3)the (4)code (5)to (6)jump (7)here (8)(index (9)1) (10)Happy suggestion
Suggestions
access
replace 'access' by 'Access'
(0)Code (1)from (2)original (3)btb_breakout (4)(call (5)$readTimer) (6)(set_local (7)$end_time). Access (8)to (9)mem (10)(i64.sub (11)(get_local (12)$end_time) (13)(get_local (14)$start_time)) (15)(set_local (16)$duration) (17)Listing (18)7: (19)Wasm (20)timer (21)used (22)in (23)btb_breakout (24)program.
(0)Code (1)from (2)original (3)btb_breakout (4)(call (5)$readTimer) (6)(set_local (7)$end_time). access (8)to (9)mem (10)(i64.sub (11)(get_local (12)$end_time) (13)(get_local (14)$start_time)) (15)(set_local (16)$duration) (17)Listing (18)7: (19)Wasm (20)timer (21)used (22)in (23)btb_breakout (24)program.
access
This sentence does not start with an uppercase letter.
Code from original btb_breakout (call $readTimer) (set_local $end_time). access to mem (i64.sub (get_local $end_time) (get_local $start_time)) (set_local $duration) Listing 7: Wasm timer used in btb_breakout program.
com-ponent
replace 'com-ponent' by 'component'
(0)Many (1)attacks (2)rely (3)on (4)a (5)timer (6)component (7)to (8)measure (9)cache (10)access (11)time (12)for (13)memory, (14)and (15)disrupting (16)this (17)component (18)effectively (19)impairs (20)the (21)attack’s (22)effectiveness. This (23)strategy (24)of (25)dynamic (26)alteration (27)has (28)also (29)been (30)employed (31)in (32)other (33)scenarios. For (34)instance, (35)to (36)counter (37)potential (38)timing (39)attacks, (40)Firefox (41)randomizes (42)its (43)built-in (44)JavaScript (45)timer (46)[44]. WASM-MUTATE (47)applies (48)the (49)same (50)strategy (51)by (52)interspersing (53)instructions (54)within (55)the (56)timing (57)steps (58)of (59)WebAssembly (60)variants. In (61)Listing (62)7 (63)and (64)Listing (65)8, (66)we (67)demonstrate (68)WASM-MUTATE’s (69)impact (70)on (71)time (72)measurements. The (73)former (74)illustrates (75)the (76)original (77)time (78)measurement, (79)while (80)the (81)latter (82)presents (83)a (84)variant (85)with (86)WASM-MUTATE-inserted (87)operations (88)amid (89)the (90)timing.
(0)Many (1)attacks (2)rely (3)on (4)a (5)timer (6)component (7)to (8)measure (9)cache (10)access (11)time (12)for (13)memory, (14)and (15)disrupting (16)this (17)com-ponent (18)effectively (19)impairs (20)the (21)attack’s (22)effectiveness. This (23)strategy (24)of (25)dynamic (26)alteration (27)has (28)also (29)been (30)employed (31)in (32)other (33)scenarios. For (34)instance, (35)to (36)counter (37)potential (38)timing (39)attacks, (40)Firefox (41)randomizes (42)its (43)built-in (44)JavaScript (45)timer (46)[44]. (47)WASM-MUTATE (48)applies (49)the (50)same (51)strategy (52)by (53)interspersing (54)instructions (55)within (56)the (57)timing (58)steps (59)of (60)WebAssembly (61)variants. In (62)Listing (63)7 (64)and (65)Listing (66)8, (67)we (68)demonstrate (69)WASM-MUTATE’s (70)impact (71)on (72)time (73)measurements. The (74)former (75)illustrates (76)the (77)original (78)time (79)measurement, (80)while (81)the (82)latter (83)presents (84)a (85)variant (86)with (87)WASM-MUTATE-inserted (88)operations (89)amid (90)the (91)timing.
ac-cesses.
replace 'ac-cesses.' by 'cycles.'
(0)This (1)success (2)is (3)explained (4)by (5)the (6)fact (7)that (8)WASM-MUTATE (9)synthesizes (10)variants (11)that (12)effectively (13)alter (14)memory (15)access (16)patterns. Specifically, (17)it (18)does (19)so (20)by (21)amplifying (22)spill/reload (23)operations, (24)injecting (25)artificial (26)global (27)variables, (28)and (29)changing (30)the (31)frequency (32)of (33)pre-existing (34)memory (35)cycles. These (36)transformations (37)influence (38)the (39)WebAssembly (40)program’s (41)memory, (42)disrupting (43)cache (44)predictors.
(0)This (1)success (2)is (3)explained (4)by (5)the (6)fact (7)that (8)WASM-MUTATE (9)synthesizes (10)variants (11)that (12)effectively (13)alter (14)memory (15)access (16)patterns. Specifically, (17)it (18)does (19)so (20)by (21)amplifying (22)spill/reload (23)operations, (24)injecting (25)artificial (26)global (27)variables, (28)and (29)changing (30)the (31)frequency (32)of (33)pre-existing (34)memory (35)ac-cesses. These (36)transformations (37)influence (38)the (39)WebAssembly (40)program’s (41)memory, (42)disrupting (43)cache (44)predictors.
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)20 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)20 (5)of (6)25
ret2spec
Possible typo detected.
Answer to RQ4: Software diversification is effective at synthesizing WebAssembly binaries that mitigate Spectre-like attacks. WASM-MUTATE generates vari-ants of btb_breakout and btb_leakage that are protected against the considered attack. For ret2spec and pht, it generates hardened variants that are more resilient to the attack than the original program: 70% of the diversified variants exhibit reduced attack effectiveness (reduced data leakage bandwidth) compared to the original program.
ret2spec
Possible typo detected.
Finally, for ret2spec and pht, both programs are hardened with attack bandwidth reduction, but this does not materialize in a short-term timeframe (low count of stacked transformations). Furthermore, the exfiltration bandwidth is more dispersed for these two programs. Our analysis indicates a correlation between bandwidth reduction and the complexity of the binary subject to diversification. Ret2spec and pht are considerably larger than btb_breakout and btb_leakage. The former comprises more than 300k instructions, while the latter two include fewer than 800 instructions. Given that WASM-MUTATE applies precise, fine-grained transformations one at a time, the likelihood of impacting critical attack components, such as timing memory accesses, diminishes for larger binaries, particularly when limited to 1,000 transformations. Based on these observations, we believe that a greater number of stacked transformations would further contribute to eventually eliminating the attacks associated with ret2spec and pht.
insert '' by 'everyone.'
(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.
(0)6. Discussion
insert '' by 'to'
(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.
(0)6. Discussion
insert '' by 'open'
(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.
(0)6. Discussion
insert '' by 'is'
(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.
(0)6. Discussion
insert '' by 'topic'
(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.
(0)6. Discussion
insert '' by 'this'
(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.
(0)6. Discussion
insert '' by 'on'
(0)6. Discussion (1)on (2)this (3)topic (4)is (5)open (6)to (7)everyone.
(0)6. Discussion
[8],
replace '[8],' by '[8,],'
(0)First, (1)as (2)emphasized (3)in (4)prior (5)applications (6)of (7)WASM-MUTATE (8)[8,], (9)uncontrolled (10)diversification (11)can (12)be (13)counter-productive (14)if (15)a (16)specific (17)objective, (18)such (19)as (20)a (21)cost (22)function, (23)is (24)not (25)established (26)at (27)the (28)beginning (29)of (30)the (31)diversification (32)process. Secondly, (33)while (34)some (35)transformations (36)yield (37)distinct (38)WebAssembly (39)binaries, (40)their (41)compilation (42)produces (43)identical (44)machine (45)code. Transformations (46)that (47)are (48)not (49)preserved (50)undermine (51)the (52)effectiveness (53)of (54)diversification. For (55)example, (56)incorporating (57)random (58)nop (59)operations (60)directly (61)into (62)WebAssembly (63)does (64)not (65)modify (66)the (67)final (68)machine (69)code (70)as (71)the (72)nop (73)operations (74)are (75)often (76)removed (77)by (78)the (79)compiler. The (80)same (81)phenomenon (82)is (83)observed (84)with (85)transformations (86)to (87)custom (88)sections (89)of (90)WebAssembly (91)binaries. Additionally, (92)it (93)is (94)important (95)to (96)note (97)that (98)transformed (99)code (100)doesn’t (101)always (102)execute, (103)i.e., (104)WASM-MUTATE (105)may (106)generate (107)dead (108)code.
(0)First, (1)as (2)emphasized (3)in (4)prior (5)applications (6)of (7)WASM-MUTATE (8)[8], (9)uncontrolled (10)diversification (11)can (12)be (13)counter-productive (14)if (15)a (16)specific (17)objective, (18)such (19)as (20)a (21)cost (22)function, (23)is (24)not (25)established (26)at (27)the (28)beginning (29)of (30)the (31)diversification (32)process. Secondly, (33)while (34)some (35)transformations (36)yield (37)distinct (38)WebAssembly (39)binaries, (40)their (41)compilation (42)produces (43)identical (44)machine (45)code. Transformations (46)that (47)are (48)not (49)preserved (50)undermine (51)the (52)effectiveness (53)of (54)diversification. (55)For (56)example, (57)incorporating (58)random (59)nop (60)operations (61)directly (62)into (63)WebAssembly (64)does (65)not (66)modify (67)the (68)final (69)machine (70)code (71)as (72)the (73)nop (74)operations (75)are (76)often (77)removed (78)by (79)the (80)compiler. (81)The (82)same (83)phenomenon (84)is (85)observed (86)with (87)transformations (88)to (89)custom (90)sections (91)of (92)WebAssembly (93)binaries. Additionally, (94)it (95)is (96)important (97)to (98)note (99)that (100)transformed (101)code (102)doesn’t (103)always (104)execute, (105)i.e., (106)WASM-MUTATE (107)may (108)generate (109)dead (110)code.
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)21 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)21 (5)of (6)25
insert '' by 'from'
(0)Static (1)software (2)diversification (3)refers (4)to (5)the (6)process (7)of (8)synthesizing, (9)and (10)distributing (11)unique (12)but (13)functionally (14)equivalent (15)programs (16)to (17)end (18)users. The (19)implementation (20)of (21)this (22)process (23)can (24)take (25)place (26)at (27)any (28)stage (29)of (30)software (31)development (32)and (33)deployment (34)- (35)from (36)the (37)inception (38)of (39)source (40)code, (41)through (42)the (43)compilation (44)phase, (45)to (46)the (47)execution (48)of (49)the (50)final (51)binary (52)[26, (53)36]. WASM-MUTATE, (54)a (55)static (56)diversifier, (57)can (58)be (59)placed (60)at (61)the (62)final (63)stage, (64)keeping (65)in (66)mind (67)that (68)the (69)code (70)will (71)subsequently (72)undergo (73)final (74)compilation (75)by (76)JIT (77)compilers. The (78)concept (79)of (80)software (81)diversification (82)owes (83)much (84)to (85)the (86)pioneering (87)work (88)of (89)Cohen (90)[13]. His (91)suite (92)of (93)code (94)transformations (95)aimed (96)to (97)increase (98)complexity (99)and (100)thereby (101)enhance (102)the (103)difficulty (104)of (105)executing (106)a (107)successful (108)attack (109)against (110)a (111)broad (112)user (113)base (114)[13]. WASM-MUTATE’s (115)rewriting (116)rules (117)draw (118)significantly (119)from (120)Cohen (121)and (122)Forrest’s (123)seminal (124)contributions (125)[13, (126)21].
(0)Static (1)software (2)diversification (3)refers (4)to (5)the (6)process (7)of (8)synthesizing, (9)and (10)distributing (11)unique (12)but (13)functionally (14)equivalent (15)programs (16)to (17)end (18)users. The (19)implementation (20)of (21)this (22)process (23)can (24)take (25)place (26)at (27)any (28)stage (29)of (30)software (31)development (32)and (33)deployment (34)-from (35)the (36)inception (37)of (38)source (39)code, (40)through (41)the (42)compilation (43)phase, (44)to (45)the (46)execution (47)of (48)the (49)final (50)binary (51)[26, (52)36]. WASM-MUTATE, (53)a (54)static (55)diversifier, (56)can (57)be (58)placed (59)at (60)the (61)final (62)stage, (63)keeping (64)in (65)mind (66)that (67)the (68)code (69)will (70)subsequently (71)undergo (72)final (73)compilation (74)by (75)JIT (76)compilers. The (77)concept (78)of (79)software (80)diversification (81)owes (82)much (83)to (84)the (85)pioneering (86)work (87)of (88)Cohen (89)[13]. His (90)suite (91)of (92)code (93)transformations (94)aimed (95)to (96)increase (97)complexity (98)and (99)thereby (100)enhance (101)the (102)difficulty (103)of (104)executing (105)a (106)successful (107)attack (108)against (109)a (110)broad (111)user (112)base (113)[13]. WASM-MUTATE’s (114)rewriting (115)rules (116)draw (117)significantly (118)from (119)Cohen (120)and (121)Forrest’s (122)seminal (123)contributions (124)[13, (125)21].
-from
replace '-from' by '-'
(0)Static (1)software (2)diversification (3)refers (4)to (5)the (6)process (7)of (8)synthesizing, (9)and (10)distributing (11)unique (12)but (13)functionally (14)equivalent (15)programs (16)to (17)end (18)users. The (19)implementation (20)of (21)this (22)process (23)can (24)take (25)place (26)at (27)any (28)stage (29)of (30)software (31)development (32)and (33)deployment (34)- (35)from (36)the (37)inception (38)of (39)source (40)code, (41)through (42)the (43)compilation (44)phase, (45)to (46)the (47)execution (48)of (49)the (50)final (51)binary (52)[26, (53)36]. WASM-MUTATE, (54)a (55)static (56)diversifier, (57)can (58)be (59)placed (60)at (61)the (62)final (63)stage, (64)keeping (65)in (66)mind (67)that (68)the (69)code (70)will (71)subsequently (72)undergo (73)final (74)compilation (75)by (76)JIT (77)compilers. The (78)concept (79)of (80)software (81)diversification (82)owes (83)much (84)to (85)the (86)pioneering (87)work (88)of (89)Cohen (90)[13]. His (91)suite (92)of (93)code (94)transformations (95)aimed (96)to (97)increase (98)complexity (99)and (100)thereby (101)enhance (102)the (103)difficulty (104)of (105)executing (106)a (107)successful (108)attack (109)against (110)a (111)broad (112)user (113)base (114)[13]. WASM-MUTATE’s (115)rewriting (116)rules (117)draw (118)significantly (119)from (120)Cohen (121)and (122)Forrest’s (123)seminal (124)contributions (125)[13, (126)21].
(0)Static (1)software (2)diversification (3)refers (4)to (5)the (6)process (7)of (8)synthesizing, (9)and (10)distributing (11)unique (12)but (13)functionally (14)equivalent (15)programs (16)to (17)end (18)users. The (19)implementation (20)of (21)this (22)process (23)can (24)take (25)place (26)at (27)any (28)stage (29)of (30)software (31)development (32)and (33)deployment (34)-from (35)the (36)inception (37)of (38)source (39)code, (40)through (41)the (42)compilation (43)phase, (44)to (45)the (46)execution (47)of (48)the (49)final (50)binary (51)[26, (52)36]. WASM-MUTATE, (53)a (54)static (55)diversifier, (56)can (57)be (58)placed (59)at (60)the (61)final (62)stage, (63)keeping (64)in (65)mind (66)that (67)the (68)code (69)will (70)subsequently (71)undergo (72)final (73)compilation (74)by (75)JIT (76)compilers. The (77)concept (78)of (79)software (80)diversification (81)owes (82)much (83)to (84)the (85)pioneering (86)work (87)of (88)Cohen (89)[13]. His (90)suite (91)of (92)code (93)transformations (94)aimed (95)to (96)increase (97)complexity (98)and (99)thereby (100)enhance (101)the (102)difficulty (103)of (104)executing (105)a (106)successful (107)attack (108)against (109)a (110)broad (111)user (112)base (113)[13]. WASM-MUTATE’s (114)rewriting (115)rules (116)draw (117)significantly (118)from (119)Cohen (120)and (121)Forrest’s (122)seminal (123)contributions (124)[13, (125)21].
Work
delete 'Work' by ''
(0)7. Related (1)Work (2)Related (3)Work (4)Related (5)Work (6)Related (7)Work (8)Related (9)Work (10)Related (11)Work (12)Related (13)Work (14)Related (15)Work (16)Related (17)Work (18)Related (19)Work (20)Related (21)Work (22)Related (23)Work (24)Related (25)Work (26)Related (27)Work (28)Related (29)Work (30)Related (31)Work (32)Related (33)Work (34)Related (35)Work (36)Related (37)Work (38)Related (39)Work (40)Related (41)Work (42)Related (43)Work (44)Related (45)Work (46)Related (47)Work (48)Related (49)Work (50)Related (51)Work (52)Related (53)Work (54)Related (55)Work (56)Related (57)Work (58)Related (59)Work (60)Related (61)Work (62)Related (63)Work (64)Related (65)Work (66)Related (67)Work (68)Related (69)Work (70)Related (71)Work (72)Related (73)Work (74)Related (75)Work (76)Related (77)Work (78)Related (79)Work (80)Related (81)Work (82)Related (83)Work (84)Related (85)Work (86)Related (87)Work (88)Related (89)Work (90)Related (91)Work (92)Related (93)Work (94)Related (95)Work (96)Related (97)Work (98)Related (99)Work (100)Related (101)Work (102)Related (103)Work (104)Related (105)Work (106)Related (107)Work (108)Related (109)Work (110)Related (111)Work (112)Related
(0)7. Related (1)Work
insert '' by 'Work'
(0)7. Related (1)Work (2)Related (3)Work (4)Related (5)Work (6)Related (7)Work (8)Related (9)Work (10)Related (11)Work (12)Related (13)Work (14)Related (15)Work (16)Related (17)Work (18)Related (19)Work (20)Related (21)Work (22)Related (23)Work (24)Related (25)Work (26)Related (27)Work (28)Related (29)Work (30)Related (31)Work (32)Related (33)Work (34)Related (35)Work (36)Related (37)Work (38)Related (39)Work (40)Related (41)Work (42)Related (43)Work (44)Related (45)Work (46)Related (47)Work (48)Related (49)Work (50)Related (51)Work (52)Related (53)Work (54)Related (55)Work (56)Related (57)Work (58)Related (59)Work (60)Related (61)Work (62)Related (63)Work (64)Related (65)Work (66)Related (67)Work (68)Related (69)Work (70)Related (71)Work (72)Related (73)Work (74)Related (75)Work (76)Related (77)Work (78)Related (79)Work (80)Related (81)Work (82)Related (83)Work (84)Related (85)Work (86)Related (87)Work (88)Related (89)Work (90)Related (91)Work (92)Related (93)Work (94)Related (95)Work (96)Related (97)Work (98)Related (99)Work (100)Related (101)Work (102)Related (103)Work (104)Related (105)Work (106)Related (107)Work (108)Related (109)Work (110)Related (111)Work (112)Related
(0)7. Related (1)Work
insert '' by 'Related'
(0)7. Related (1)Work (2)Related (3)Work (4)Related (5)Work (6)Related (7)Work (8)Related (9)Work (10)Related (11)Work (12)Related (13)Work (14)Related (15)Work (16)Related (17)Work (18)Related (19)Work (20)Related (21)Work (22)Related (23)Work (24)Related (25)Work (26)Related (27)Work (28)Related (29)Work (30)Related (31)Work (32)Related (33)Work (34)Related (35)Work (36)Related (37)Work (38)Related (39)Work (40)Related (41)Work (42)Related (43)Work (44)Related (45)Work (46)Related (47)Work (48)Related (49)Work (50)Related (51)Work (52)Related (53)Work (54)Related (55)Work (56)Related (57)Work (58)Related (59)Work (60)Related (61)Work (62)Related (63)Work (64)Related (65)Work (66)Related (67)Work (68)Related (69)Work (70)Related (71)Work (72)Related (73)Work (74)Related (75)Work (76)Related (77)Work (78)Related (79)Work (80)Related (81)Work (82)Related (83)Work (84)Related (85)Work (86)Related (87)Work (88)Related (89)Work (90)Related (91)Work (92)Related (93)Work (94)Related (95)Work (96)Related (97)Work (98)Related (99)Work (100)Related (101)Work (102)Related (103)Work (104)Related (105)Work (106)Related (107)Work (108)Related (109)Work (110)Related (111)Work (112)Related
(0)7. Related (1)Work
implementa-tion
replace 'implementa-tion' by 'implementation'
(0)Jackson (1)and (2)colleagues (3)proposed (4)the (5)pivotal (6)role (7)of (8)the (9)compiler (10)in (11)promoting (12)static (13)software (14)diversification (15)[26]. Within (16)the (17)WebAssembly (18)context, (19)CROW (20)is (21)the (22)only (23)existing (24)compiler-based (25)diversifier (26)[1]. It (27)is (28)recognized (29)as (30)a (31)superdiversifier (32)for (33)WebAssembly, (34)built (35)within (36)the (37)LLVM (38)compilation (39)toolchain (40)[27]. However, (41)the (42)direct (43)integration (44)of (45)the (46)diversifier (47)into (48)the (49)LLVM (50)compiler (51)restricts (52)its (53)applicability (54)to (55)WebAssembly (56)binaries (57)generated (58)through (59)LLVM. This (60)limitation (61)implies (62)that (63)WebAssembly (64)source (65)code (66)without (67)an (68)LLVM (69)frontend (70)implementation (71)cannot (72)leverage (73)CROW’s (74)capabilities. Conversely, (75)WASM-MUTATE (76)provides (77)a (78)more (79)adaptable (80)and (81)expedited (82)WebAssembly (83)to (84)WebAssembly (85)diversification (86)solution, (87)ensuring (88)compatibility (89)with (90)any (91)compiler. Additionally, (92)unlike (93)CROW, (94)WASM-MUTATE (95)does (96)not (97)depend (98)on (99)an (100)SMT (101)solver (102)to (103)validate (104)the (105)generated (106)variants. It (107)instead (108)guarantees (109)semantic (110)equivalence (111)by (112)design, (113)leading (114)to (115)increased (116)efficiency (117)in (118)generating (119)WebAssembly (120)variants, (121)as (122)discussed (123)in (124)subsection (125)5.1. Consequently, (126)CROW (127)seems (128)to (129)provide (130)variants (131)that (132)are (133)more (134)resilient (135)to (136)further (137)compiler (138)optimizations. WASM-MUTATE (139)trades (140)off (141)the (142)preservation (143)of (144)generated (145)variants (146)to (147)create (148)more (149)variants. According (150)to (151)CROW (152)reports, (153)WASM-MUTATE (154)generates (155)more (156)variants (157)by (158)at (159)least (160)one (161)order (162)of (163)magnitude (164)in (165)the (166)same (167)amount (168)of (169)time. Overall, (170)as (171)a (172)WebAssembly (173)to (174)WebAssembly (175)diversification (176)tool, (177)WASM-MUTATE (178)extends (179)the (180)range (181)of (182)tools (183)capable (184)of (185)generating (186)WebAssembly (187)programs, (188)a (189)topic (190)thoroughly (191)explored (192)in (193)this (194)work.
(0)Jackson (1)and (2)colleagues (3)proposed (4)the (5)pivotal (6)role (7)of (8)the (9)compiler (10)in (11)promoting (12)static (13)software (14)diversification (15)[26]. Within (16)the (17)WebAssembly (18)context, (19)CROW (20)is (21)the (22)only (23)existing (24)compiler-based (25)diversifier (26)[1]. It (27)is (28)recognized (29)as (30)a (31)superdiversifier (32)for (33)WebAssembly, (34)built (35)within (36)the (37)LLVM (38)compilation (39)toolchain (40)[27]. However, (41)the (42)direct (43)integration (44)of (45)the (46)diversifier (47)into (48)the (49)LLVM (50)compiler (51)restricts (52)its (53)applicability (54)to (55)WebAssembly (56)binaries (57)generated (58)through (59)LLVM. This (60)limitation (61)implies (62)that (63)WebAssembly (64)source (65)code (66)without (67)an (68)LLVM (69)frontend (70)implementa-tion (71)cannot (72)leverage (73)CROW’s (74)capabilities. Conversely, (75)WASM-MUTATE (76)provides (77)a (78)more (79)adaptable (80)and (81)expedited (82)WebAssembly (83)to (84)WebAssembly (85)diversification (86)solution, (87)ensuring (88)compatibility (89)with (90)any (91)compiler. Additionally, (92)unlike (93)CROW, (94)WASM-MUTATE (95)does (96)not (97)depend (98)on (99)an (100)SMT (101)solver (102)to (103)validate (104)the (105)generated (106)variants. It (107)instead (108)guarantees (109)semantic (110)equivalence (111)by (112)design, (113)leading (114)to (115)increased (116)efficiency (117)in (118)generating (119)WebAssembly (120)variants, (121)as (122)discussed (123)in (124)subsection (125)5.1. Consequently, (126)CROW (127)seems (128)to (129)provide (130)variants (131)that (132)are (133)more (134)resilient (135)to (136)further (137)compiler (138)optimizations. WASM-MUTATE (139)trades (140)off (141)the (142)preservation (143)of (144)generated (145)variants (146)to (147)create (148)more (149)variants. According (150)to (151)CROW (152)reports, (153)WASM-MUTATE (154)generates (155)more (156)variants (157)by (158)at (159)least (160)one (161)order (162)of (163)magnitude (164)in (165)the (166)same (167)amount (168)of (169)time. (170)Overall, (171)as (172)a (173)WebAssembly (174)to (175)WebAssembly (176)diversification (177)tool, (178)WASM-MUTATE (179)extends (180)the (181)range (182)of (183)tools (184)capable (185)of (186)generating (187)WebAssembly (188)programs, (189)a (190)topic (191)thoroughly (192)explored (193)in (194)this (195)work.
maintaining
replace 'maintaining' by 'keeping'
(0)As (1)far (2)as (3)we (4)know, (5)Tigress (6)is (7)the (8)only (9)cutting-edge (10)frontend (11)diversifying (12)virtualizer/obfuscator (13)that (14)supports (15)WebAssembly (16)[14]. Tigress’ (17)approach (18)transforms (19)the (20)C (21)code, (22)keeping (23)it (24)suitable (25)for (26)compilation (27)using (28)Emscripten, (29)a (30)C-to-Wasm (31)compiler, (32)resulting (33)in (34)a (35)We-bAssembly/html/Javascript (36)package. In (37)general, (38)applying (39)diversification (40)at (41)the (42)frontend (43)has (44)limitations. First, (45)it (46)would (47)require (48)a (49)unique (50)diversification (51)mechanism (52)for (53)each (54)language (55)compatible (56)with (57)the (58)frontend (59)component. Even (60)though (61)C/C++ (62)code (63)is (64)the (65)most (66)frequently (67)ported-to (68)Web-Assembly (69)language (70)[25], (71)our (72)needs (73)involve (74)modifying (75)any (76)Wasm (77)in (78)existence. Second, (79)source-based (80)diversification (81)tends (82)to (83)alter (84)the (85)code (86)section (87)of (88)the (89)final (90)WebAssembly (91)binary (92)more (93)significantly. As (94)a (95)result, (96)other (97)sections (98)of (99)the (100)WebAssembly (101)binaries (102)receive (103)less (104)attention, (105)or (106)even (107)remain (108)untouched, (109)during (110)the (111)diversification (112)process. Yet, (113)WASM-MUTATE, (114)can (115)modify (116)any (117)section (118)of (119)any (120)WebAssembly (121)binary (122)in (123)existence. Third, (124)source (125)code (126)diversification (127)could (128)unintentionally (129)introduce (130)compiler (131)fingerprints (132)into (133)the (134)compiled (135)WebAssembly (136)[8].
(0)As (1)far (2)as (3)we (4)know, (5)Tigress (6)is (7)the (8)only (9)cutting-edge (10)frontend (11)diversifying (12)virtualizer/obfuscator (13)that (14)supports (15)WebAssembly (16)[14]. Tigress’s (17)approach (18)transforms (19)the (20)C (21)code, (22)maintaining (23)it (24)suitable (25)for (26)compilation (27)using (28)Emscripten, (29)a (30)C-to-Wasm (31)compiler, (32)resulting (33)in (34)a (35)We-bAssembly/html/Javascript (36)package. In (37)general, (38)applying (39)diversification (40)at (41)the (42)frontend (43)has (44)limitations. First, (45)it (46)would (47)require (48)a (49)unique (50)diversification (51)mechanism (52)for (53)each (54)language (55)compatible (56)with (57)the (58)frontend (59)component. Even (60)though (61)C/C++ (62)code (63)is (64)the (65)most (66)frequently (67)ported-to (68)Web-Assembly (69)language (70)[25], (71)our (72)needs (73)involve (74)modifying (75)any (76)Wasm (77)in (78)existence. Second, (79)source-based (80)diversification (81)tends (82)to (83)alter (84)the (85)code (86)section (87)of (88)the (89)final (90)WebAssembly (91)binary (92)more (93)significantly. As (94)a (95)result, (96)other (97)sections (98)of (99)the (100)WebAssembly (101)binaries (102)receive (103)less (104)attention, (105)or (106)even (107)remain (108)untouched, (109)during (110)the (111)diversification (112)process. Yet, (113)WASM-MUTATE, (114)can (115)modify (116)any (117)section (118)of (119)any (120)WebAssembly (121)binary (122)in (123)existence. Third, (124)source (125)code (126)diversification (127)could (128)unintentionally (129)introduce (130)compiler (131)fingerprints (132)into (133)the (134)compiled (135)WebAssembly (136)[8].
Tigress’s
replace 'Tigress’s' by 'Tigress’'
(0)As (1)far (2)as (3)we (4)know, (5)Tigress (6)is (7)the (8)only (9)cutting-edge (10)frontend (11)diversifying (12)virtualizer/obfuscator (13)that (14)supports (15)WebAssembly (16)[14]. Tigress’ (17)approach (18)transforms (19)the (20)C (21)code, (22)keeping (23)it (24)suitable (25)for (26)compilation (27)using (28)Emscripten, (29)a (30)C-to-Wasm (31)compiler, (32)resulting (33)in (34)a (35)We-bAssembly/html/Javascript (36)package. In (37)general, (38)applying (39)diversification (40)at (41)the (42)frontend (43)has (44)limitations. First, (45)it (46)would (47)require (48)a (49)unique (50)diversification (51)mechanism (52)for (53)each (54)language (55)compatible (56)with (57)the (58)frontend (59)component. Even (60)though (61)C/C++ (62)code (63)is (64)the (65)most (66)frequently (67)ported-to (68)Web-Assembly (69)language (70)[25], (71)our (72)needs (73)involve (74)modifying (75)any (76)Wasm (77)in (78)existence. Second, (79)source-based (80)diversification (81)tends (82)to (83)alter (84)the (85)code (86)section (87)of (88)the (89)final (90)WebAssembly (91)binary (92)more (93)significantly. As (94)a (95)result, (96)other (97)sections (98)of (99)the (100)WebAssembly (101)binaries (102)receive (103)less (104)attention, (105)or (106)even (107)remain (108)untouched, (109)during (110)the (111)diversification (112)process. Yet, (113)WASM-MUTATE, (114)can (115)modify (116)any (117)section (118)of (119)any (120)WebAssembly (121)binary (122)in (123)existence. Third, (124)source (125)code (126)diversification (127)could (128)unintentionally (129)introduce (130)compiler (131)fingerprints (132)into (133)the (134)compiled (135)WebAssembly (136)[8].
(0)As (1)far (2)as (3)we (4)know, (5)Tigress (6)is (7)the (8)only (9)cutting-edge (10)frontend (11)diversifying (12)virtualizer/obfuscator (13)that (14)supports (15)WebAssembly (16)[14]. Tigress’s (17)approach (18)transforms (19)the (20)C (21)code, (22)maintaining (23)it (24)suitable (25)for (26)compilation (27)using (28)Emscripten, (29)a (30)C-to-Wasm (31)compiler, (32)resulting (33)in (34)a (35)We-bAssembly/html/Javascript (36)package. In (37)general, (38)applying (39)diversification (40)at (41)the (42)frontend (43)has (44)limitations. First, (45)it (46)would (47)require (48)a (49)unique (50)diversification (51)mechanism (52)for (53)each (54)language (55)compatible (56)with (57)the (58)frontend (59)component. Even (60)though (61)C/C++ (62)code (63)is (64)the (65)most (66)frequently (67)ported-to (68)Web-Assembly (69)language (70)[25], (71)our (72)needs (73)involve (74)modifying (75)any (76)Wasm (77)in (78)existence. Second, (79)source-based (80)diversification (81)tends (82)to (83)alter (84)the (85)code (86)section (87)of (88)the (89)final (90)WebAssembly (91)binary (92)more (93)significantly. As (94)a (95)result, (96)other (97)sections (98)of (99)the (100)WebAssembly (101)binaries (102)receive (103)less (104)attention, (105)or (106)even (107)remain (108)untouched, (109)during (110)the (111)diversification (112)process. Yet, (113)WASM-MUTATE, (114)can (115)modify (116)any (117)section (118)of (119)any (120)WebAssembly (121)binary (122)in (123)existence. Third, (124)source (125)code (126)diversification (127)could (128)unintentionally (129)introduce (130)compiler (131)fingerprints (132)into (133)the (134)compiled (135)WebAssembly (136)[8].
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)22 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)22 (5)of (6)25
insert '' by 'a'
(0)In (1)future (2)work, (3)we (4)aim (5)to (6)fine-tune (7)the (8)diversification (9)process, (10)balancing (11)broad (12)diversification (13)with (14)the (15)needs (16)of (17)specific (18)scenarios. Besides, (19)the (20)creation (21)of (22)rewriting (23)rules (24)for (25)WASM-MUTATE (26)is (27)currently (28)a (29)manual (30)task, (31)yet (32)we (33)have (34)identified (35)potential (36)for (37)automation. For (38)instance, (39)WASM-MUTATE (40)could (41)be (42)enhanced (43)through (44)data-driven (45)methods (46)such (47)as (48)rule (49)mining. Furthermore, (50)we (51)have (52)observed (53)that (54)the (55)impact (56)of (57)WASM-MUTATE (58)on (59)ret2spec (60)and (61)pht (62)attacks (63)is (64)considerably (65)less (66)compared (67)to (68)btb (69)attacks. These (70)attacks (71)exploit (72)the (73)returning (74)address (75)of (76)executed (77)functions (78)in (79)the (80)program (81)stack. One (82)mitigation (83)of (84)this (85)would (86)be (87)a (88)multivariant (89)execution (90)strategy, (91)implemented (92)on (93)top (94)of (95)WASM-MUTATE. By (96)offering (97)different (98)execution (99)paths, (100)the (101)returning (102)addresses (103)on (104)the (105)stack (106)at (107)each (108)function (109)execution (110)would (111)vary, (112)thereby (113)improving (114)the (115)hardening (116)of (117)binaries (118)against (119)ret2spec (120)attacks.
(0)In (1)future (2)work, (3)we (4)aim (5)to (6)fine-tune (7)the (8)diversification (9)process, (10)balancing (11)broad (12)diversification (13)with (14)the (15)needs (16)of (17)specific (18)scenarios. Besides, (19)the (20)creation (21)of (22)rewriting (23)rules (24)for (25)WASM-MUTATE (26)is (27)currently (28)a (29)manual (30)task, (31)yet (32)we (33)have (34)identified (35)potential (36)for (37)automation. For (38)instance, (39)WASM-MUTATE (40)could (41)be (42)enhanced (43)through (44)data-driven (45)methods (46)such (47)as (48)rule (49)mining. Furthermore, (50)we (51)have (52)observed (53)that (54)the (55)impact (56)of (57)WASM-MUTATE (58)on (59)ret2spec (60)and (61)pht (62)attacks (63)is (64)considerably (65)less (66)compared (67)to (68)btb (69)attacks. These (70)attacks (71)exploit (72)the (73)returning (74)address (75)of (76)executed (77)functions (78)in (79)the (80)program (81)stack. One (82)mitigation (83)of (84)this (85)would (86)be (87)multivariant (88)execution (89)strategy, (90)implemented (91)on (92)top (93)of (94)WASM-MUTATE. By (95)offering (96)different (97)execution (98)paths, (99)the (100)returning (101)addresses (102)on (103)the (104)stack (105)at (106)each (107)function (108)execution (109)would (110)vary, (111)thereby (112)improving (113)the (114)hardening (115)of (116)binaries (117)against (118)ret2spec (119)attacks.
ret2spec
Possible typo detected.
In future work, we aim to fine-tune the diversification process, balancing broad diversification with the needs of specific scenarios. Besides, the creation of rewriting rules for WASM-MUTATE is currently a manual task, yet we have identified potential for automation. For instance, WASM-MUTATE could be enhanced through data-driven methods such as rule mining. Furthermore, we have observed that the impact of WASM-MUTATE on ret2spec and pht attacks is considerably less compared to btb attacks. These attacks exploit the returning address of executed functions in the program stack. One mitigation of this would be multivariant execution strategy, implemented on top of WASM-MUTATE. By offering different execution paths, the returning addresses on the stack at each function execution would vary, thereby improving the hardening of binaries against ret2spec attacks.
ret2spec
Possible typo detected.
WASM-MUTATE is a fast and effective diversification tool for WebAssembly, with a 100% diversification rate across the 303 programs of the considered benchmark. Concerning speed, it creates over 9000 unique variants per hour. The WASM-MUTATE workflow ensures that all final variants offer different and unique execution traces. Remarkably, WASM-MUTATE creates variants that have a minimal impact on execution time. We have proven that WASM-MUTATE can mitigate Spectre attacks in WebAssembly, producing fully protected variants of two versions of the btb attack, and variants of ret2spec and pht that leak less data than the original ones.
insert '' by 'Conclusion:'
(0)8. Conclusion: (1)Conclusion: (2)Conclusion: (3)Conclusion: (4)Conclusion: (5)Conclusion: (6)Conclusion: (7)Conclusion: (8)Conclusion: (9)Conclusion: (10)Conclusion: (11)Conclusion: (12)Conclusion: (13)Conclusion: (14)Conclusion: (15)Conclusion: (16)Conclusion: (17)Conclusion: (18)Conclusion: (19)Conclusion: (20)Conclusion: (21)Conclusion: (22)Conclusion: (23)Conclusion: (24)Conclusion: (25)Conclusion: (26)Conclusion: (27)Conclusion: (28)Conclusion: (29)Conclusion: (30)Conclusion: (31)Conclusion: (32)Conclusion: (33)Conclusion: (34)Conclusion: (35)Conclusion: (36)Conclusion: (37)Conclusion: (38)Conclusion: (39)Conclusion: (40)Conclusion: (41)Conclusion: (42)Conclusion: (43)Conclusion: (44)Conclusion: (45)Conclusion: (46)Conclusion: (47)Conclusion: (48)Conclusion: (49)Conclusion: (50)Conclusion: (51)Conclusion: (52)Conclusion: (53)Conclusion: (54)Conclusion: (55)Conclusion: (56)Conclusion
(0)8. Conclusion
with
replace 'with' by 'to'
(0)BREWasm (1)[10] (2)offers (3)a (4)comprehensive (5)static (6)binary (7)rewriting (8)framework (9)for (10)WebAssembly (11)and (12)can (13)be (14)considered (15)to (16)be (17)the (18)most (19)similar (20)to (21)WASM-MUTATE. For (22)instance, (23)it (24)can (25)be (26)used (27)to (28)model (29)a (30)diversification (31)engine. It (32)parses (33)a (34)WebAssembly (35)binary (36)into (37)objects, (38)rewrites (39)them (40)using (41)fine-grained (42)APIs, (43)integrates (44)these (45)APIs (46)to (47)provide (48)high-level (49)ones, (50)and (51)re-encodes (52)the (53)updated (54)objects (55)back (56)into (57)a (58)valid (59)WebAssembly (60)binary. The (61)effectiveness (62)and (63)efficiency (64)of (65)BREWasm (66)have (67)been (68)demonstrated (69)through (70)various (71)WebAssembly (72)applications (73)and (74)case (75)studies (76)on (77)code (78)obfuscation, (79)software (80)testing, (81)program (82)repair, (83)and (84)software (85)optimization. The (86)implementation (87)of (88)BREWasm (89)follows (90)a (91)completely (92)different (93)technical (94)approach. In (95)comparison (96)to (97)our (98)work, (99)the (100)authors (101)pointed (102)out (103)that (104)our (105)tool (106)employs (107)lazy (108)parsing (109)of (110)WebAssembly. Although (111)they (112)perceived (113)this (114)as (115)a (116)limitation, (117)it (118)is (119)eagerly (120)implemented (121)to (122)accelerate (123)the (124)generation (125)of (126)WebAssembly (127)binaries. Additionally, (128)our (129)tool (130)leverages (131)the (132)parser (133)and (134)encoder (135)of (136)wasmtime, (137)a (138)standalone (139)compiler (140)and (141)interpreter (142)for (143)WebAssembly, (144)thereby (145)boosting (146)its (147)reliability (148)and (149)lowering (150)its (151)error-prone (152)nature.
(0)BREWasm (1)[10] (2)offers (3)a (4)comprehensive (5)static (6)binary (7)rewriting (8)framework (9)for (10)WebAssembly (11)and (12)can (13)be (14)con-sidered (15)to (16)be (17)the (18)most (19)similar (20)to (21)WASM-MUTATE. For (22)instance, (23)it (24)can (25)be (26)used (27)to (28)model (29)a (30)diversification (31)engine. (32)It (33)parses (34)a (35)WebAssembly (36)binary (37)into (38)objects, (39)rewrites (40)them (41)using (42)fine-grained (43)APIs, (44)integrates (45)these (46)APIs (47)to (48)provide (49)high-level (50)ones, (51)and (52)re-encodes (53)the (54)updated (55)objects (56)back (57)into (58)a (59)valid (60)WebAssembly (61)binary. The (62)effectiveness (63)and (64)efficiency (65)of (66)BREWasm (67)have (68)been (69)demonstrated (70)through (71)various (72)WebAssembly (73)applications (74)and (75)case (76)studies (77)on (78)code (79)obfuscation, (80)software (81)testing, (82)program (83)repair, (84)and (85)software (86)optimization. The (87)implementation (88)of (89)BREWasm (90)follows (91)a (92)completely (93)different (94)technical (95)approach. In (96)comparison (97)with (98)our (99)work, (100)the (101)authors (102)pointed (103)out (104)that (105)our (106)tool (107)employs (108)lazy (109)parsing (110)of (111)WebAssembly. Although (112)they (113)perceived (114)this (115)as (116)a (117)limitation, (118)it (119)is (120)eagerly (121)implemented (122)to (123)accelerate (124)the (125)generation (126)of (127)WebAssembly (128)binaries. Additionally, (129)our (130)tool (131)leverages (132)the (133)parser (134)and (135)encoder (136)of (137)wasmtime, (138)a (139)standalone (140)compiler (141)and (142)interpreter (143)for (144)WebAssembly, (145)thereby (146)boosting (147)its (148)reliability (149)and (150)lowering (151)its (152)error-prone (153)nature.
con-sidered
replace 'con-sidered' by 'considered'
(0)BREWasm (1)[10] (2)offers (3)a (4)comprehensive (5)static (6)binary (7)rewriting (8)framework (9)for (10)WebAssembly (11)and (12)can (13)be (14)considered (15)to (16)be (17)the (18)most (19)similar (20)to (21)WASM-MUTATE. For (22)instance, (23)it (24)can (25)be (26)used (27)to (28)model (29)a (30)diversification (31)engine. It (32)parses (33)a (34)WebAssembly (35)binary (36)into (37)objects, (38)rewrites (39)them (40)using (41)fine-grained (42)APIs, (43)integrates (44)these (45)APIs (46)to (47)provide (48)high-level (49)ones, (50)and (51)re-encodes (52)the (53)updated (54)objects (55)back (56)into (57)a (58)valid (59)WebAssembly (60)binary. The (61)effectiveness (62)and (63)efficiency (64)of (65)BREWasm (66)have (67)been (68)demonstrated (69)through (70)various (71)WebAssembly (72)applications (73)and (74)case (75)studies (76)on (77)code (78)obfuscation, (79)software (80)testing, (81)program (82)repair, (83)and (84)software (85)optimization. The (86)implementation (87)of (88)BREWasm (89)follows (90)a (91)completely (92)different (93)technical (94)approach. In (95)comparison (96)to (97)our (98)work, (99)the (100)authors (101)pointed (102)out (103)that (104)our (105)tool (106)employs (107)lazy (108)parsing (109)of (110)WebAssembly. Although (111)they (112)perceived (113)this (114)as (115)a (116)limitation, (117)it (118)is (119)eagerly (120)implemented (121)to (122)accelerate (123)the (124)generation (125)of (126)WebAssembly (127)binaries. Additionally, (128)our (129)tool (130)leverages (131)the (132)parser (133)and (134)encoder (135)of (136)wasmtime, (137)a (138)standalone (139)compiler (140)and (141)interpreter (142)for (143)WebAssembly, (144)thereby (145)boosting (146)its (147)reliability (148)and (149)lowering (150)its (151)error-prone (152)nature.
(0)BREWasm (1)[10] (2)offers (3)a (4)comprehensive (5)static (6)binary (7)rewriting (8)framework (9)for (10)WebAssembly (11)and (12)can (13)be (14)con-sidered (15)to (16)be (17)the (18)most (19)similar (20)to (21)WASM-MUTATE. For (22)instance, (23)it (24)can (25)be (26)used (27)to (28)model (29)a (30)diversification (31)engine. (32)It (33)parses (34)a (35)WebAssembly (36)binary (37)into (38)objects, (39)rewrites (40)them (41)using (42)fine-grained (43)APIs, (44)integrates (45)these (46)APIs (47)to (48)provide (49)high-level (50)ones, (51)and (52)re-encodes (53)the (54)updated (55)objects (56)back (57)into (58)a (59)valid (60)WebAssembly (61)binary. The (62)effectiveness (63)and (64)efficiency (65)of (66)BREWasm (67)have (68)been (69)demonstrated (70)through (71)various (72)WebAssembly (73)applications (74)and (75)case (76)studies (77)on (78)code (79)obfuscation, (80)software (81)testing, (82)program (83)repair, (84)and (85)software (86)optimization. The (87)implementation (88)of (89)BREWasm (90)follows (91)a (92)completely (93)different (94)technical (95)approach. In (96)comparison (97)with (98)our (99)work, (100)the (101)authors (102)pointed (103)out (104)that (105)our (106)tool (107)employs (108)lazy (109)parsing (110)of (111)WebAssembly. Although (112)they (113)perceived (114)this (115)as (116)a (117)limitation, (118)it (119)is (120)eagerly (121)implemented (122)to (123)accelerate (124)the (125)generation (126)of (127)WebAssembly (128)binaries. Additionally, (129)our (130)tool (131)leverages (132)the (133)parser (134)and (135)encoder (136)of (137)wasmtime, (138)a (139)standalone (140)compiler (141)and (142)interpreter (143)for (144)WebAssembly, (145)thereby (146)boosting (147)its (148)reliability (149)and (150)lowering (151)its (152)error-prone (153)nature.
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)23 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)23 (5)of (6)25
https://doi.
delete 'https://doi.' by ''
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
URL:
delete 'URL:' by ''
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
243-255.
delete '243-255.' by ''
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
p.
delete 'p.' by ''
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
USA.
delete 'USA.' by ''
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
NY,
delete 'NY,' by ''
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
York,
delete 'York,' by ''
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
New
replace 'New' by 'https://doi.org.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Machinery,
replace 'Machinery,' by 'URL:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Computing
replace 'Computing' by '243-255.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
for
replace 'for' by 'p.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Association
replace 'Association' by 'USA.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Security,
replace 'Security,' by 'NY,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Communications
replace 'Communications' by 'York,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
and
replace 'and' by 'New'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Computer
replace 'Computer' by 'Machinery,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
on
replace 'on' by 'Computing'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Conference
replace 'Conference' by 'for'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
SIGSAC
replace 'SIGSAC' by 'Association'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
ACM
replace 'ACM' by 'Security,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
22nd
replace '22nd' by 'Communications'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
the
replace 'the' by 'and'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
of
replace 'of' by 'Computer'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Proceedings
replace 'Proceedings' by 'on'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
in:
replace 'in:' by 'Conference'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
attacks,
replace 'attacks,' by 'SIGSAC'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
function-reuse
replace 'function-reuse' by 'ACM'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
against
replace 'against' by '22nd'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
protection
replace 'protection' by 'the'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
and
replace 'and' by 'of'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
randomization
replace 'randomization' by 'Proceedings'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Table
replace 'Table' by 'in:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
trap:
replace 'trap:' by 'attacks,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
a
replace 'a' by 'function-reuse'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
It’s
replace 'It’s' by 'against'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2015.
replace '2015.' by 'protection'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
M.,
replace 'M.,' by 'and'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Franz,
replace 'Franz,' by 'randomization'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
B.,
replace 'B.,' by 'Table'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Sutter,
replace 'Sutter,' by 'trap:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
De
replace 'De' by 'a'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
T.,
replace 'T.,' by 'It’s'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Holz,
replace 'Holz,' by '2015.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
A.R.,
replace 'A.R.,' by 'M.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Sadeghi,
replace 'Sadeghi,' by 'Franz,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
L.,
replace 'L.,' by 'B.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Davi,
replace 'Davi,' by 'Sutter,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
P.,
replace 'P.,' by 'De'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Larsen,
replace 'Larsen,' by 'T.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
C.,
replace 'C.,' by 'Holz,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Liebchen,
replace 'Liebchen,' by 'A.R.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
F.,
replace 'F.,' by 'Sadeghi,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Schuster,
replace 'Schuster,' by 'L.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
S.,
replace 'S.,' by 'Davi,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Volckaert,
replace 'Volckaert,' by 'P.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
S.J.,
replace 'S.J.,' by 'Larsen,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Crane,
replace 'Crane,' by 'C.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Zealand.
replace 'Zealand.' by 'Liebchen,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
New
replace 'New' by 'F.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Auckland,
replace 'Auckland,' by 'Schuster,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
of
replace 'of' by 'S.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
University
replace 'University' by 'Volckaert,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
The
replace 'The' by 'S.J.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Science,
replace 'Science,' by 'Crane,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Computer
replace 'Computer' by 'Zealand.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
of
replace 'of' by 'New'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Department
replace 'Department' by 'Auckland,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Report.
replace 'Report.' by 'of'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Technical
replace 'Technical' by 'University'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
transformations.
replace 'transformations.' by 'Science,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
obfuscating
replace 'obfuscating' by 'Computer'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
taxonomy
delete 'taxonomy' by ''
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
A
delete 'A' by ''
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
1997.
replace '1997.' by 'Department'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
D.,
replace 'D.,' by 'Report.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Low,
replace 'Low,' by 'Technical'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
C.,
replace 'C.,' by 'transformations.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Thomborson,
replace 'Thomborson,' by 'obfuscating'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
C.,
replace 'C.,' by 'of'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Collberg,
replace 'Collberg,' by 'taxonomy'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
565-584.
replace '565-584.' by 'A'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
12,
replace '12,' by '1997.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Security
replace 'Security' by 'D.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
&
replace '&' by 'Low,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Computers
replace 'Computers' by 'C.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
evolution.
replace 'evolution.' by 'Thomborson,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
program
replace 'program' by 'C.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
through
replace 'through' by 'Collberg,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
protection
replace 'protection' by '565-584.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
system
replace 'system' by '12,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Operating
replace 'Operating' by 'Security'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
1993.
replace '1993.' by '&'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
F.B.,
replace 'F.B.,' by 'Computers'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Cohen,
replace 'Cohen,' by 'evolution.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2086702.
replace '2086702.' by 'program'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
doi:10.1145/2086696.
replace 'doi:10.1145/2086696.' by 'through'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2086702,
replace '2086702,' by 'protection'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
https://doi.org/10.1145/2086696.
replace 'https://doi.org/10.1145/2086696.' by 'system'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
URL:
replace 'URL:' by 'Operating'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
8.
replace '8.' by '1993.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Optim.
replace 'Optim.' by 'F.B.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Code
replace 'Code' by 'Cohen,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Archit.
replace 'Archit.' by '2086702.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Trans.
replace 'Trans.' by 'doi:10.1145/2086696.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
ACM
replace 'ACM' by '2086702,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
processors.
replace 'processors.' by 'https://doi.org/10.1145/2086696.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
x86
replace 'x86' by 'URL:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
modern
replace 'modern' by '8.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
on
replace 'on' by 'Optim.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
attacks
replace 'attacks' by 'Code'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
time
replace 'time' by 'Archit.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
for
replace 'for' by 'Trans.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
mitigations
replace 'mitigations' by 'ACM'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Compiler
replace 'Compiler' by 'processors.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2012.
replace '2012.' by 'x86'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
B.,
replace 'B.,' by 'modern'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Sutter,
replace 'Sutter,' by 'on'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
De
replace 'De' by 'attacks'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
B.,
replace 'B.,' by 'time'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Coppens,
replace 'Coppens,' by 'for'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
J.V.,
replace 'J.V.,' by 'mitigations'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Cleemput,
replace 'Cleemput,' by 'Compiler'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2308.03123.
replace '2308.03123.' by '2012.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
arXiv:
replace 'arXiv:' by 'B.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
03123,
replace '03123,' by 'Sutter,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2308.
replace '2308.' by 'De'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
48550/arXiv.
replace '48550/arXiv.' by 'B.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
arXiv:2308.03123doi:10.
replace 'arXiv:2308.03123doi:10.' by 'Coppens,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
,
replace ',' by 'J.V.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
e-prints
replace 'e-prints' by 'Cleemput,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
arXiv
replace 'arXiv' by '2308.03123.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
WebAssembly.
replace 'WebAssembly.' by 'arXiv:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
for
replace 'for' by '03123,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Obfus-cation
replace 'Obfus-cation' by '2308.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Binary
replace 'Binary' by '48550/arXiv.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
WASMixer:
replace 'WASMixer:' by 'arXiv:2308.03123doi:10.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2023.
replace '2023.' by ','
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
H.,
replace 'H.,' by 'e-prints'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Wang,
replace 'Wang,' by 'ArXiv'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Y.,
replace 'Y.,' by 'WebAssembly.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Guo,
replace 'Guo,' by 'for'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
N.,
replace 'N.,' by 'Obfus-cation'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
He,
replace 'He,' by 'Binary'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
S.,
replace 'S.,' by '2023.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Cao,
replace 'Cao,' by 'H.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
139-163.
replace '139-163.' by 'Wang,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
pp.
replace 'pp.' by 'Y.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Cham.
replace 'Cham.' by 'Guo,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Switzerland,
replace 'Switzerland,' by 'N.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Nature
replace 'Nature' by 'He,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Springer
replace 'Springer' by 'S.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Analysis,
replace 'Analysis,' by 'Cao,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Static
replace 'Static' by '139-163.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
(Eds.),
replace '(Eds.),' by 'pp.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
J.F.
replace 'J.F.' by 'Cham.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Morales,
replace 'Morales,' by 'Switzerland,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
M.V.,
replace 'M.V.,' by 'Nature'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Hermenegildo,
replace 'Hermenegildo,' by 'Springer'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
in:
replace 'in:' by 'Analysis,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
webassembly,
replace 'webassembly,' by 'Static'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
for
replace 'for' by '(Eds.),'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
framework
replace 'framework' by 'J.F.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
rewriting
replace 'rewriting' by 'Morales,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
binary
replace 'binary' by 'M.V.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
static
replace 'static' by 'Hermenegildo,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
general
replace 'general' by 'in:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
A
replace 'A' by 'webassembly,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Brewasm:
replace 'Brewasm:' by 'for'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2023b.
replace '2023b.' by 'framework'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
H.,
replace 'H.,' by 'rewriting'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Wang,
replace 'Wang,' by 'binary'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Y.,
replace 'Y.,' by 'static'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Guo,
replace 'Guo,' by 'general'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
N.,
replace 'N.,' by 'A'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
He,
replace 'He,' by '2023b.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
S.,
replace 'S.,' by 'H.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Cao,
replace 'Cao,' by 'Wang,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
doi:10.1145/3571207.
replace 'doi:10.1145/3571207.' by 'Y.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
org/10.1145/3571207,
replace 'org/10.1145/3571207,' by 'Guo,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
https://doi.
replace 'https://doi.' by 'N.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
URL:
replace 'URL:' by 'He,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
7.
replace '7.' by 'S.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Lang.
replace 'Lang.' by 'Cao,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Program.
replace 'Program.' by 'doi:10.1145/3571207.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
ACM
replace 'ACM' by 'org/10.1145/3571207,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Proc.
replace 'Proc.' by 'https://doi.org.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
anti-unification.
replace 'anti-unification.' by 'URL:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
and
replace 'and' by '7.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
e-graphs
replace 'e-graphs' by 'Lang.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
with
replace 'with' by 'Program.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
abstractions
replace 'abstractions' by 'ACM'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
better
replace 'better' by 'Proc.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Learning
replace 'Learning' by 'anti-unification.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Babble:
replace 'Babble:' by 'and'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2023a.
replace '2023a.' by 'e-graphs'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
N.,
replace 'N.,' by 'with'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Polikarpova,
replace 'Polikarpova,' by 'abstractions'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Z.,
replace 'Z.,' by 'better'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Tatlock,
replace 'Tatlock,' by 'Learning'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
M.,
replace 'M.,' by 'Babble:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Willsey,
replace 'Willsey,' by '2023a.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
C.,
replace 'C.,' by 'N.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Nandi,
replace 'Nandi,' by 'Polikarpova,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
R.,
replace 'R.,' by 'and'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Kunkel,
replace 'Kunkel,' by 'Z.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
D.,
replace 'D.,' by 'Tatlock,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Cao,
replace 'Cao,' by 'M.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2023.103296.
replace '2023.103296.' by 'Willsey,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
doi:https://doi.org/10.1016/j.cose.
replace 'doi:https://doi.org/10.1016/j.cose.' by 'C.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
article/pii/S0167404823002067,
replace 'article/pii/S0167404823002067,' by 'Nandi,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
sciencedirect.com/science/
replace 'sciencedirect.com/science/' by 'R.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
https://www.
replace 'https://www.' by 'Kunkel,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
URL:
replace 'URL:' by 'D.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
103296.
replace '103296.' by 'Cao,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
131,
replace '131,' by '2023.103296.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Se-curity
replace 'Se-curity' by 'doi:https://doi.org/10.1016/j.cose.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
&
replace '&' by 'article/pii/S0167404823002067,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Computers
replace 'Computers' by 'Sciencedirect.com/science/'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
evasion.
replace 'evasion.' by 'https://www.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
malware
replace 'malware' by 'URL:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
for
replace 'for' by '103296.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
diversification
replace 'diversification' by '131,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Webassembly
replace 'Webassembly' by 'Security'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2023.
replace '2023.' by '&'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
B.,
replace 'B.,' by 'Computers'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Baudry,
replace 'Baudry,' by 'evasion.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
T.,
replace 'T.,' by 'malware'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Toady,
replace 'Toady,' by 'for'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
M.,
replace 'M.,' by 'diversification'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Monperrus,
replace 'Monperrus,' by 'Webassembly'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
J.,
replace 'J.,' by '2023.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Cabrera-Arteaga,
replace 'Cabrera-Arteaga,' by 'B.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
3564007.
replace '3564007.' by 'Baudry,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
doi:10.1145/3560828.
replace 'doi:10.1145/3560828.' by 'T.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
3564007,
replace '3564007,' by 'Toady,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
10.1145/3560828.
replace '10.1145/3560828.' by 'M.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
https://doi.org/
replace 'https://doi.org/' by 'Monperrus,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
URL:
replace 'URL:' by 'J.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
11-22.
replace '11-22.' by 'Cabrera-Arteaga,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
p.
replace 'p.' by '3564007.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
USA.
replace 'USA.' by 'doi:10.1145/3560828.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
NY,
replace 'NY,' by '3564007,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
York,
replace 'York,' by 'https://doi.org/10.1145/3560828.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
New
replace 'New' by 'URL:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Machinery,
replace 'Machinery,' by '11-22.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Computing
replace 'Computing' by 'p.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
for
replace 'for' by 'USA.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Association
replace 'Association' by 'NY,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Defense,
replace 'Defense,' by 'York,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Target
replace 'Target' by 'New'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Moving
replace 'Moving' by 'Machinery,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
on
replace 'on' by 'Computing'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Workshop
replace 'Workshop' by 'for'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
ACM
replace 'ACM' by 'Association'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
9th
replace '9th' by 'Defense,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
the
replace 'the' by 'Target'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
of
replace 'of' by 'Moving'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Proceedings
replace 'Proceedings' by 'on'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
in:
replace 'in:' by 'Workshop'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
edge,
replace 'edge,' by 'ACM'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
the
replace 'the' by '9th'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
at
replace 'at' by 'the'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
execution
replace 'execution' by 'of'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Multi-variant
replace 'Multi-variant' by 'Proceedings'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2022.
replace '2022.' by 'in:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
B.,
replace 'B.,' by 'edge,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Baudry,
replace 'Baudry,' by 'the'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
M.,
replace 'M.,' by 'at'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Monperrus,
replace 'Monperrus,' by 'execution'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
P.,
replace 'P.,' by 'Multi-variant'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Laperdrix,
replace 'Laperdrix,' by '2022.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
J.,
replace 'J.,' by 'B.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Arteaga,
replace 'Arteaga,' by 'Baudry,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Cabrera
replace 'Cabrera' by 'M.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
3397567.
replace '3397567.' by 'Monperrus,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
1145/3397537.
replace '1145/3397537.' by 'P.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
doi:10.
replace 'doi:10.' by 'Laperdrix,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
//arxiv.org/pdf/2002.10213,
replace '//arxiv.org/pdf/2002.10213,' by 'J.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
http:
replace 'http:' by 'Arteaga,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
URL:
replace 'URL:' by 'Cabrera'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Runtimes.
replace 'Runtimes.' by '3397567.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Language
replace 'Language' by '1145/3397537.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Modern
replace 'Modern' by 'doi:10.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
on
replace 'on' by 'http://www.arxiv.org/pdf/2002.10213,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Workshop
replace 'Workshop' by 'URL:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
MoreVMs:
replace 'MoreVMs:' by 'Runtimes.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
of
replace 'of' by 'Language'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Proceedings
replace 'Proceedings' by 'Modern'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
in:
replace 'in:' by 'on'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
bytecode,
replace 'bytecode,' by 'Workshop'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
webassembly
replace 'webassembly' by 'MoreVMs:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
insert '' by 'Proceedings'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Superoptimization
replace 'Superoptimization' by 'in:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2020.
replace '2020.' by 'bytecode,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
M.,
replace 'M.,' by 'webassembly'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Monperrus,
replace 'Monperrus,' by 'of'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
B.,
replace 'B.,' by 'Superoptimization'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Baudry,
replace 'Baudry,' by '2020.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
L.,
replace 'L.,' by 'M.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Satabin,
replace 'Satabin,' by 'Monperrus,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
O.,
replace 'O.,' by 'B.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Floros,
replace 'Floros,' by 'Baudry,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
J.,
replace 'J.,' by 'L.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Gu,
replace 'Gu,' by 'Satabin,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
S.,
replace 'S.,' by 'O.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Donde,
replace 'Donde,' by 'Floros,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Cabrera-Arteaga,
delete 'Cabrera-Arteaga,' by ''
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
358924.
replace '358924.' by 'Gu,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2007.
replace '2007.' by 'S.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
doi:10.1109/PCCC.
replace 'doi:10.1109/PCCC.' by 'Donde,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
434-441.
replace '434-441.' by 'J.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
pp.
replace 'pp.' by 'Cabrera-Arteaga,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Conference,
replace 'Conference,' by '358924.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Communications
replace 'Communications' by '2007.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
and
replace 'and' by 'doi:10.1109/PCCC.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Computing,
replace 'Computing,' by '434-441.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Performance,
replace 'Performance,' by 'pp.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Inter-national
replace 'Inter-national' by 'Conference,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
IEEE
replace 'IEEE' by 'Communications'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2007
replace '2007' by 'and'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
in:
replace 'in:' by 'Computing,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
exploits,
replace 'exploits,' by 'Performance,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
error
replace 'error' by 'Inter-national'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
memory
replace 'memory' by 'IEEE'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
defeating
replace 'defeating' by '2007'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
for
replace 'for' by 'in:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
replice
replace 'replice' by 'exploits,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
process
replace 'process' by 'error'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Diversified
replace 'Diversified' by 'memory'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2007.
replace '2007.' by 'defeating'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
A.,
replace 'A.,' by 'for'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Lanzi,
replace 'Lanzi,' by 'replice'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
L.,
replace 'L.,' by 'process'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Cavallaro,
replace 'Cavallaro,' by 'Diversified'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
D.,
replace 'D.,' by '2007.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Bruschi,
replace 'Bruschi,' by 'A.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
1016/j.cose.2022.102745.
replace '1016/j.cose.2022.102745.' by 'Lanzi,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
doi:https://doi.org/10.
replace 'doi:https://doi.org/10.' by 'L.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
com/science/article/pii/S167404822001407,
replace 'com/science/article/pii/S167404822001407,' by 'Cavallaro,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
https://www.sciencedirect.
replace 'https://www.sciencedirect.' by 'D.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
URL:
replace 'URL:' by 'Bruschi,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
102745.
replace '102745.' by '1016/j.cose.2022.102745.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
118,
replace '118,' by 'doi:https://doi.org/10.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Security
replace 'Security' by 'com/science/article/pii/S167404822001407,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
&
replace '&' by 'https://www.sciencedirect.com.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Com-puters
replace 'Com-puters' by 'URL:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
webassembly.
replace 'webassembly.' by '102745.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
for
replace 'for' by '118,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
scanner
replace 'scanner' by 'Security'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
vulnerability
replace 'vulnerability' by '&'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
static
replace 'static' by 'Com-puters'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
efficient
replace 'efficient' by 'assembly.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
An
replace 'An' by 'web'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Wasmati:
replace 'Wasmati:' by 'for'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2022.
replace '2022.' by 'scanner'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
J.F.,
replace 'J.F.,' by 'vulnerability'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Santos,
replace 'Santos,' by 'static'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
N.,
replace 'N.,' by 'efficient'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Santos,
replace 'Santos,' by 'An'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
P.,
replace 'P.,' by 'Wasmati:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Lopes,
replace 'Lopes,' by '2022.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
T.,
replace 'T.,' by 'J.F.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Brito,
replace 'Brito,' by 'Santos,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
00085.
replace '00085.' by 'N.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2023.
replace '2023.' by 'Santos,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
doi:10.1109/SANER56733.
replace 'doi:10.1109/SANER56733.' by 'P.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
753-757.
replace '753-757.' by 'Lopes,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
pp.
replace 'pp.' by 'T.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
(SANER),
replace '(SANER),' by 'Brito,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Reengineering
replace 'Reengineering' by '00085.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
and
replace 'and' by '2023.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Evolution
replace 'Evolution' by 'doi:10.1109/SANER56733.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Analysis,
replace 'Analysis,' by '753-757.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Software
replace 'Software' by 'pp.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
on
replace 'on' by '(SANER),'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Conference
replace 'Conference' by 'Reengineering'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
International
replace 'International' by 'and'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
IEEE
replace 'IEEE' by 'Evolution'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2023
replace '2023' by 'Analysis,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
in:
replace 'in:' by 'Software'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
everyone,
replace 'everyone,' by 'on'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
for
replace 'for' by 'Conference'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
framework
replace 'framework' by 'International'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
analysis
replace 'analysis' by 'IEEE'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
webassembly
replace 'webassembly' by '2023'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
static
replace 'static' by 'in:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
A
replace 'A' by 'everyone,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Wasma:
replace 'Wasma:' by 'for'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
2023.
replace '2023.' by 'framework'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
M.,
replace 'M.,' by 'analysis'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Mezini,
replace 'Mezini,' by 'webassembly'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
L.,
replace 'L.,' by 'static'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Baumgartner,
replace 'Baumgartner,' by 'A'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
T.,
replace 'T.,' by 'Wasma:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Roth,
replace 'Roth,' by '2023.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
F.,
replace 'F.,' by 'M.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Breitfelder,
replace 'Breitfelder,' by 'Mezini,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
usenix.org/conference/usenixsecurity19/presentation/azad.
replace 'usenix.org/conference/usenixsecurity19/presentation/azad.' by 'L.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
https://www.
replace 'https://www.' by 'Baumgartner,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
URL:
replace 'URL:' by 'T.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
1697-1714.
replace '1697-1714.' by 'Roth,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
pp.
replace 'pp.' by 'F.,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
CA.
replace 'CA.' by 'Breitfelder,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Clara,
replace 'Clara,' by 'Usenix.org/conference/usenixsecurity19/presentation/azad.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Santa
replace 'Santa' by 'https://www.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Association,
replace 'Association,' by 'URL:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
USENIX
replace 'USENIX' by '1697-1714.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
19),
replace '19),' by 'pp.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Security
replace 'Security' by 'CA.'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
(USENIX
replace '(USENIX' by 'Clara,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Symposium
replace 'Symposium' by 'Santa'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Security
replace 'Security' by 'Association,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
insert '' by '19),'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
insert '' by 'Security'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
insert '' by '(USENIX'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
28th
replace '28th' by 'Symposium'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
in:
replace 'in:' by 'Security'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
applications,
replace 'applications,' by 'USENIX'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
web
replace 'web' by '28th'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
debloating
replace 'debloating' by 'in:'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
of
replace 'of' by 'applications,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
benefits
replace 'benefits' by 'web'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
security
replace 'security' by 'debloating'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
the
replace 'the' by 'of'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Quantifying
replace 'Quantifying' by 'benefits'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
more:
replace 'more:' by 'security'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
is
replace 'is' by 'the'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
Less
replace 'Less' by 'Quantifying'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
insert '' by 'assembly,'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
webassembly,
replace 'webassembly,' by 'web'
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)web (30)assembly, (31)in: (32)Proceedings (33)of (34)MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Quantifying (41)the (42)security (43)benefits (44)of (45)debloating (46)web (47)applications, (48)in: (49)28th (50)USENIX (51)Security (52)Symposium (53)(USENIX (54)Security (55)19), (56)USENIX (57)Association, (58)Santa (59)Clara, (60)CA. pp. 1697-1714. URL: (61)https://www. Usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, (62)F., (63)Roth, (64)T., (65)Baumgartner, (66)L., (67)Mezini, (68)M., (69)2023. Wasma: (70)A (71)static (72)webassembly (73)analysis (74)framework (75)for (76)everyone, (77)in: (78)2023 (79)IEEE (80)International (81)Conference (82)on (83)Software (84)Analysis, (85)Evolution (86)and (87)Reengineering (88)(SANER), (89)pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, (90)T., (91)Lopes, (92)P., (93)Santos, (94)N., (95)Santos, (96)J.F., (97)2022. Wasmati: (98)An (99)efficient (100)static (101)vulnerability (102)scanner (103)for (104)web (105)assembly. Com-puters (106)& (107)Security (108)118, (109)102745. URL: (110)https://www.sciencedirect.com. com/science/article/pii/S167404822001407, (111)doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, (112)D., (113)Cavallaro, (114)L., (115)Lanzi, (116)A., (117)2007. Diversified (118)process (119)replice (120)for (121)defeating (122)memory (123)error (124)exploits, (125)in: (126)2007 (127)IEEE (128)Inter-national (129)Performance, (130)Computing, (131)and (132)Communications (133)Conference, (134)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, (135)J., (136)Donde, (137)S., (138)Gu, (139)J., (140)Floros, (141)O., (142)Satabin, (143)L., (144)Baudry, (145)B., (146)Monperrus, (147)M., (148)2020. Superoptimization (149)of (150)webassembly (151)bytecode, (152)in: (153)Proceedings (154)of (155)MoreVMs: (156)Workshop (157)on (158)Modern (159)Language (160)Runtimes. URL: (161)http://www.arxiv.org/pdf/2002.10213, (162)doi:10. 1145/3397537. 3397567. Cabrera (163)Arteaga, (164)J., (165)Laperdrix, (166)P., (167)Monperrus, (168)M., (169)Baudry, (170)B., (171)2022. Multi-variant (172)execution (173)at (174)the (175)edge, (176)in: (177)Proceedings (178)of (179)the (180)9th (181)ACM (182)Workshop (183)on (184)Moving (185)Target (186)Defense, (187)Association (188)for (189)Computing (190)Machinery, (191)New (192)York, (193)NY, (194)USA. p. 11-22. URL: (195)https://doi.org/10.1145/3560828. 3564007, (196)doi:10.1145/3560828. 3564007. Cabrera-Arteaga, (197)J., (198)Monperrus, (199)M., (200)Toady, (201)T., (202)Baudry, (203)B., (204)2023. Webassembly (205)diversification (206)for (207)malware (208)evasion. Computers (209)& (210)Security (211)131, (212)103296. URL: (213)https://www. Sciencedirect.com/science/ (214)article/pii/S0167404823002067, (215)doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, (216)D., (217)Kunkel, (218)R., (219)Nandi, (220)C., (221)Willsey, (222)M., (223)Tatlock, (224)Z., (225)and (226)Polikarpova, (227)N., (228)2023a. Babble: (229)Learning (230)better (231)abstractions (232)with (233)e-graphs (234)and (235)anti-unification. Proc. ACM (236)Program. Lang. 7. URL: (237)https://doi.org. org/10.1145/3571207, (238)doi:10.1145/3571207. Cao, (239)S., (240)He, (241)N., (242)Guo, (243)Y., (244)Wang, (245)H., (246)2023b. A (247)general (248)static (249)binary (250)rewriting (251)framework (252)for (253)webassembly, (254)in: (255)Hermenegildo, (256)M.V., (257)Morales, (258)J.F. (Eds.), (259)Static (260)Analysis, (261)Springer (262)Nature (263)Switzerland, (264)Cham. pp. 139-163. Cao, (265)S., (266)He, (267)N., (268)Guo, (269)Y., (270)Wang, (271)H., (272)2023. Binary (273)Obfus-cation (274)for (275)WebAssembly. ArXiv (276)e-prints (277), (278)arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, (279)arXiv: (280)2308.03123. Cleemput, (281)J.V., (282)Coppens, (283)B., (284)De (285)Sutter, (286)B., (287)2012. Compiler (288)mitigations (289)for (290)time (291)attacks (292)on (293)modern (294)x86 (295)processors. ACM (296)Trans. Archit. Code (297)Optim. 8. URL: (298)https://doi.org/10.1145/2086696. 2086702, (299)doi:10.1145/2086696. 2086702. Cohen, (300)F.B., (301)1993. Operating (302)system (303)protection (304)through (305)program (306)evolution. Computers (307)& (308)Security (309)12, (310)565-584. Collberg, (311)C., (312)Thomborson, (313)C., (314)Low, (315)D., (316)1997. A (317)taxonomy (318)of (319)obfuscating (320)transformations. Technical (321)Report. Department (322)of (323)Computer (324)Science, (325)University (326)of (327)Auckland, (328)New (329)Zealand. Crane, (330)S.J., (331)Volckaert, (332)S., (333)Schuster, (334)F., (335)Liebchen, (336)C., (337)Larsen, (338)P., (339)Davi, (340)L., (341)Sadeghi, (342)A.R., (343)Holz, (344)T., (345)De (346)Sutter, (347)B., (348)Franz, (349)M., (350)2015. It’s (351)a (352)trap: (353)Table (354)randomization (355)and (356)protection (357)against (358)function-reuse (359)attacks, (360)in: (361)Proceedings (362)of (363)the (364)22nd (365)ACM (366)SIGSAC (367)Conference (368)on (369)Computer (370)and (371)Communications (372)Security, (373)Association (374)for (375)Computing (376)Machinery, (377)New (378)York, (379)NY, (380)USA. p. 243-255. URL: (381)https://doi.org. org/10.1145/2810103. 2813682, (382)doi:10.1145/2810103. 2813682.
(0)[1] (1)[2] (2)[3] (3)[4] (4)[5] (5)[6] (6)[7] (7)[8] (8)[9] (9)[10] (10)[11] (11)[12] (12)[13] (13)[14] (14)[15] (15)Arteaga, (16)J.C., (17)Malivitsis, (18)O.F., (19)Pérez, (20)O.L.V., (21)Baudry, (22)B., (23)Monperrus, (24)M., (25)2021. Crow: (26)Code (27)diversification (28)for (29)webassembly, (30)in: (31)Proceedings (32)of (33)MadWEB. doi:10.14722/madweb. 2021. 23xxx. (34)Azad, (35)B.A., (36)Laperdrix, (37)P., (38)Nikiforakis, (39)N., (40)2019. Less (41)is (42)more: (43)Quantifying (44)the (45)security (46)benefits (47)of (48)debloating (49)web (50)applications, (51)in: (52)28th (53)USENIX (54)Security (55)Symposium (56)(USENIX (57)Security (58)19), (59)USENIX (60)Association, (61)Santa (62)Clara, (63)CA. pp. 1697-1714. URL: (64)https://www. (65)usenix.org/conference/usenixsecurity19/presentation/azad. (66)Breitfelder, (67)F., (68)Roth, (69)T., (70)Baumgartner, (71)L., (72)Mezini, (73)M., (74)2023. Wasma: (75)A (76)static (77)webassembly (78)analysis (79)framework (80)for (81)everyone, (82)in: (83)2023 (84)IEEE (85)International (86)Conference (87)on (88)Software (89)Analysis, (90)Evolution (91)and (92)Reengineering (93)(SANER), (94)pp. 753-757. doi:10.1109/SANER56733. 2023. (95)00085. (96)Brito, (97)T., (98)Lopes, (99)P., (100)Santos, (101)N., (102)Santos, (103)J.F., (104)2022. Wasmati: (105)An (106)efficient (107)static (108)vulnerability (109)scanner (110)for (111)webassembly. Com-puters (112)& (113)Security (114)118, (115)102745. URL: (116)https://www.sciencedirect. (117)com/science/article/pii/S167404822001407, (118)doi:https://doi.org/10. (119)1016/j.cose.2022.102745. (120)Bruschi, (121)D., (122)Cavallaro, (123)L., (124)Lanzi, (125)A., (126)2007. Diversified (127)process (128)replice (129)for (130)defeating (131)memory (132)error (133)exploits, (134)in: (135)2007 (136)IEEE (137)Inter-national (138)Performance, (139)Computing, (140)and (141)Communications (142)Conference, (143)pp. 434-441. doi:10.1109/PCCC. 2007. 358924. (144)Cabrera-Arteaga, (145)J., (146)Donde, (147)S., (148)Gu, (149)J., (150)Floros, (151)O., (152)Satabin, (153)L., (154)Baudry, (155)B., (156)Monperrus, (157)M., (158)2020. Superoptimization (159)of (160)webassembly (161)bytecode, (162)in: (163)Proceedings (164)of (165)MoreVMs: (166)Workshop (167)on (168)Modern (169)Language (170)Runtimes. URL: (171)http: (172)//arxiv.org/pdf/2002.10213, (173)doi:10. (174)1145/3397537. 3397567. (175)Cabrera (176)Arteaga, (177)J., (178)Laperdrix, (179)P., (180)Monperrus, (181)M., (182)Baudry, (183)B., (184)2022. (185)Multi-variant (186)execution (187)at (188)the (189)edge, (190)in: (191)Proceedings (192)of (193)the (194)9th (195)ACM (196)Workshop (197)on (198)Moving (199)Target (200)Defense, (201)Association (202)for (203)Computing (204)Machinery, (205)New (206)York, (207)NY, (208)USA. p. 11-22. URL: (209)https://doi.org/ (210)10.1145/3560828. 3564007, (211)doi:10.1145/3560828. 3564007. (212)Cabrera-Arteaga, (213)J., (214)Monperrus, (215)M., (216)Toady, (217)T., (218)Baudry, (219)B., (220)2023. (221)Webassembly (222)diversification (223)for (224)malware (225)evasion. Computers (226)& (227)Se-curity (228)131, (229)103296. URL: (230)https://www. sciencedirect.com/science/ (231)article/pii/S0167404823002067, (232)doi:https://doi.org/10.1016/j.cose. (233)2023.103296. (234)Cao, (235)D., (236)Kunkel, (237)R., (238)Nandi, (239)C., (240)Willsey, (241)M., (242)Tatlock, (243)Z., (244)Polikarpova, (245)N., (246)2023a. Babble: (247)Learning (248)better (249)abstractions (250)with (251)e-graphs (252)and (253)anti-unification. Proc. ACM (254)Program. Lang. 7. URL: (255)https://doi. (256)org/10.1145/3571207, (257)doi:10.1145/3571207. (258)Cao, (259)S., (260)He, (261)N., (262)Guo, (263)Y., (264)Wang, (265)H., (266)2023b. Brewasm: (267)A (268)general (269)static (270)binary (271)rewriting (272)framework (273)for (274)webassembly, (275)in: (276)Hermenegildo, (277)M.V., (278)Morales, (279)J.F. (Eds.), (280)Static (281)Analysis, (282)Springer (283)Nature (284)Switzerland, (285)Cham. pp. 139-163. (286)Cao, (287)S., (288)He, (289)N., (290)Guo, (291)Y., (292)Wang, (293)H., (294)2023. WASMixer: (295)Binary (296)Obfus-cation (297)for (298)WebAssembly. arXiv (299)e-prints (300), (301)arXiv:2308.03123doi:10. (302)48550/arXiv. 2308. 03123, (303)arXiv: (304)2308.03123. (305)Cleemput, (306)J.V., (307)Coppens, (308)B., (309)De (310)Sutter, (311)B., (312)2012. Compiler (313)mitigations (314)for (315)time (316)attacks (317)on (318)modern (319)x86 (320)processors. ACM (321)Trans. (322)Archit. Code (323)Optim. 8. URL: (324)https://doi.org/10.1145/2086696. (325)2086702, (326)doi:10.1145/2086696. 2086702. (327)Cohen, (328)F.B., (329)1993. Operating (330)system (331)protection (332)through (333)program (334)evolution. Computers (335)& (336)Security (337)12, (338)565-584. (339)Collberg, (340)C., (341)Thomborson, (342)C., (343)Low, (344)D., (345)1997. A (346)taxonomy (347)of (348)obfuscating (349)transformations. Technical (350)Report. Department (351)of (352)Computer (353)Science, (354)The (355)University (356)of (357)Auckland, (358)New (359)Zealand. (360)Crane, (361)S.J., (362)Volckaert, (363)S., (364)Schuster, (365)F., (366)Liebchen, (367)C., (368)Larsen, (369)P., (370)Davi, (371)L., (372)Sadeghi, (373)A.R., (374)Holz, (375)T., (376)De (377)Sutter, (378)B., (379)Franz, (380)M., (381)2015. It’s (382)a (383)trap: (384)Table (385)randomization (386)and (387)protection (388)against (389)function-reuse (390)attacks, (391)in: (392)Proceedings (393)of (394)the (395)22nd (396)ACM (397)SIGSAC (398)Conference (399)on (400)Computer (401)and (402)Communications (403)Security, (404)Association (405)for (406)Computing (407)Machinery, (408)New (409)York, (410)NY, (411)USA. p. 243-255. URL: (412)https://doi. (413)org/10.1145/2810103. 2813682, (414)doi:10.1145/2810103. 2813682.
doi
This sentence does not start with an uppercase letter.
[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] Arteaga, J.C., Malivitsis, O.F., Pérez, O.L.V., Baudry, B., Monperrus, M., 2021. Crow: Code diversification for webassembly, in: Proceedings of MadWEB. doi:10.14722/madweb. 2021. 23xxx. Azad, B.A., Laperdrix, P., Nikiforakis, N., 2019. Less is more: Quantifying the security benefits of debloating web applications, in: 28th USENIX Security Symposium (USENIX Security 19), USENIX Association, Santa Clara, CA. pp. 1697-1714. URL: https://www. usenix.org/conference/usenixsecurity19/presentation/azad. Breitfelder, F., Roth, T., Baumgartner, L., Mezini, M., 2023. Wasma: A static webassembly analysis framework for everyone, in: 2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 753-757. doi:10.1109/SANER56733. 2023. 00085. Brito, T., Lopes, P., Santos, N., Santos, J.F., 2022. Wasmati: An efficient static vulnerability scanner for webassembly. Com-puters & Security 118, 102745. URL: https://www.sciencedirect. com/science/article/pii/S167404822001407, doi:https://doi.org/10. 1016/j.cose.2022.102745. Bruschi, D., Cavallaro, L., Lanzi, A., 2007. Diversified process replice for defeating memory error exploits, in: 2007 IEEE Inter-national Performance, Computing, and Communications Conference, pp. 434-441. doi:10.1109/PCCC. 2007. 358924. Cabrera-Arteaga, J., Donde, S., Gu, J., Floros, O., Satabin, L., Baudry, B., Monperrus, M., 2020. Superoptimization of webassembly bytecode, in: Proceedings of MoreVMs: Workshop on Modern Language Runtimes. URL: http: //arxiv.org/pdf/2002.10213, doi:10. 1145/3397537. 3397567. Cabrera Arteaga, J., Laperdrix, P., Monperrus, M., Baudry, B., 2022. Multi-variant execution at the edge, in: Proceedings of the 9th ACM Workshop on Moving Target Defense, Association for Computing Machinery, New York, NY, USA. p. 11-22. URL: https://doi.org/ 10.1145/3560828. 3564007, doi:10.1145/3560828. 3564007. Cabrera-Arteaga, J., Monperrus, M., Toady, T., Baudry, B., 2023. Webassembly diversification for malware evasion. Computers & Se-curity 131, 103296. URL: https://www. sciencedirect.com/science/ article/pii/S0167404823002067, doi:https://doi.org/10.1016/j.cose. 2023.103296. Cao, D., Kunkel, R., Nandi, C., Willsey, M., Tatlock, Z., Polikarpova, N., 2023a. Babble: Learning better abstractions with e-graphs and anti-unification. Proc. ACM Program. Lang. 7. URL: https://doi. org/10.1145/3571207, doi:10.1145/3571207. Cao, S., He, N., Guo, Y., Wang, H., 2023b. Brewasm: A general static binary rewriting framework for webassembly, in: Hermenegildo, M.V., Morales, J.F. (Eds.), Static Analysis, Springer Nature Switzerland, Cham. pp. 139-163. Cao, S., He, N., Guo, Y., Wang, H., 2023. WASMixer: Binary Obfus-cation for WebAssembly. arXiv e-prints , arXiv:2308.03123doi:10. 48550/arXiv. 2308. 03123, arXiv: 2308.03123. Cleemput, J.V., Coppens, B., De Sutter, B., 2012. Compiler mitigations for time attacks on modern x86 processors. ACM Trans. Archit. Code Optim. 8. URL: https://doi.org/10.1145/2086696. 2086702, doi:10.1145/2086696. 2086702. Cohen, F.B., 1993. Operating system protection through program evolution. Computers & Security 12, 565-584. Collberg, C., Thomborson, C., Low, D., 1997. A taxonomy of obfuscating transformations. Technical Report. Department of Computer Science, The University of Auckland, New Zealand. Crane, S.J., Volckaert, S., Schuster, F., Liebchen, C., Larsen, P., Davi, L., Sadeghi, A.R., Holz, T., De Sutter, B., Franz, M., 2015. It’s a trap: Table randomization and protection against function-reuse attacks, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, New York, NY, USA. p. 243-255. URL: https://doi. org/10.1145/2810103. 2813682, doi:10.1145/2810103. 2813682.
References
replace 'References' by 'References.'
(0)References.
(0)References
insert '' by 'and'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
doi:10.1109/SP.
delete 'doi:10.1109/SP.' by ''
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
1-19.
replace '1-19.' by 'of'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
pp.
replace 'pp.' by 'year'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
(SP),
replace '(SP),' by 'the'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Privacy
replace 'Privacy' by 'is'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
and
replace 'and' by '2019'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Security
replace 'Security' by 'doi:10.1109/SP.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
on
replace 'on' by '1-19.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Symposium
replace 'Symposium' by 'pp.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
IEEE
replace 'IEEE' by '(SP),'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
2019
replace '2019' by 'Privacy'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
in:
replace 'in:' by 'and'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
execution,
replace 'execution,' by 'Security'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
speculative
replace 'speculative' by 'on'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Exploiting
replace 'Exploiting' by 'Symposium'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
attacks:
replace 'attacks:' by 'IEEE'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Spectre
replace 'Spectre' by '2019'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
2019.
replace '2019.' by 'in:'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Y.,
replace 'Y.,' by 'execution,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Yarom,
replace 'Yarom,' by 'speculative'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
M.,
replace 'M.,' by 'Exploiting'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Schwarz,
replace 'Schwarz,' by 'attacks:'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
T.,
replace 'T.,' by 'Spectre'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Prescher,
replace 'Prescher,' by '2019.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
S.,
replace 'S.,' by 'Y.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Mangard,
replace 'Mangard,' by 'Yarom,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Lipp,
delete 'Lipp,' by ''
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
M.,
replace 'M.,' by 'Schwarz,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Hamburg,
replace 'Hamburg,' by 'T.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
W.,
replace 'W.,' by 'Prescher,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Haas,
replace 'Haas,' by 'M.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
D.,
replace 'D.,' by 'Lipp,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Gruss,
replace 'Gruss,' by 'M.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
D.,
replace 'D.,' by 'Hamburg,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Genkin,
replace 'Genkin,' by 'W.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
A.,
replace 'A.,' by 'Haas,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Fogh,
replace 'Fogh,' by 'D.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
J.,
replace 'J.,' by 'Gruss,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Horn,
replace 'Horn,' by 'D.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
P.,
replace 'P.,' by 'Genkin,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Kocher,
replace 'Kocher,' by 'A.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
2022.00077.
replace '2022.00077.' by 'Fogh,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
1109/CLOUD55607.
replace '1109/CLOUD55607.' by 'J.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
doi:10.
replace 'doi:10.' by 'Horn,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
543-553.
replace '543-553.' by 'P.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
pp.
replace 'pp.' by 'Kocher,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
(CLOUD),
replace '(CLOUD),' by '2022.00077.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Computing
replace 'Computing' by '1109/CLOUD55607.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Cloud
replace 'Cloud' by 'doi:10.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
on
replace 'on' by '543-553.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Conference
replace 'Conference' by 'pp.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
International
replace 'International' by '(CLOUD),'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
15th
replace '15th' by 'Computing'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
IEEE
replace 'IEEE' by 'Cloud'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
2022
replace '2022' by 'on'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
in:
replace 'in:' by 'Conference'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
solutions,
replace 'solutions,' by 'International'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
security
replace 'security' by '15th'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
webassembly
replace 'webassembly' by 'IEEE'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
of
replace 'of' by '2022'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
survey
replace 'survey' by 'in:'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
assemble!
replace 'assemble!' by 'solutions,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Avengers,
replace 'Avengers,' by 'security'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
2022.
replace '2022.' by 'webassembly'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Y.,
replace 'Y.,' by 'of'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Shin,
replace 'Shin,' by 'survey'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
H.,
replace 'H.,' by 'assemble!'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Jang,
replace 'Jang,' by 'Avengers,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
M.,
replace 'M.,' by '2022.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Kim,
replace 'Kim,' by 'Y.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
html.
replace 'html.' by 'Shin,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
wasm-overview.
replace 'wasm-overview.' by 'H.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
https://kotlinlang.org/docs/
replace 'https://kotlinlang.org/docs/' by 'Jang,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
=
replace '=' by 'M.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
URL:
replace 'URL:' by 'Kim,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
wasm.
replace 'wasm.' by '='
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Kotlin
replace 'Kotlin' by 'URL'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
2023.
replace '2023.' by 'html.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Jetbrain,
replace 'Jetbrain,' by 'wasm-overview.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
100-120.
replace '100-120.' by 'https://kotlinlang.org/docs/'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
pp.
replace 'pp.' by 'wasm.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Springer.
replace 'Springer.' by 'Kotlin'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Security,
replace 'Security,' by '2023.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
on
replace 'on' by 'Jetbrain,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Workshop
replace 'Workshop' by '100-120.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
International
replace 'International' by 'pp.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
in:
replace 'in:' by 'Springer.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
protection,
replace 'protection,' by 'Security,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
soft-ware
replace 'soft-ware' by 'on'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
for
replace 'for' by 'Workshop'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
individualization
replace 'individualization' by 'International'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Peephole
replace 'Peephole' by 'in:'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
superdiversifier:
replace 'superdiversifier:' by 'protection,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
The
replace 'The' by 'soft-ware'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
2008.
replace '2008.' by 'for'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
R.,
replace 'R.,' by 'individualization'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Venkatesan,
replace 'Venkatesan,' by 'Peephole'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
C.W.N.,
replace 'C.W.N.,' by 'superdiversifier:'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Saw,
replace 'Saw,' by 'The'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
P.,
replace 'P.,' by '2008.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Naldurg,
replace 'Naldurg,' by 'R.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
M.H.,
replace 'M.H.,' by 'Venkatesan,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Jakubowski,
replace 'Jakubowski,' by 'and'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
M.,
replace 'M.,' by 'C.W.N.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Jacob,
replace 'Jacob,' by 'Saw,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
77-98.
replace '77-98.' by 'P.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
pp.
replace 'pp.' by 'Naldurg,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Springer,
replace 'Springer,' by 'M.H.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Defense.
replace 'Defense.' by 'Jakubowski,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Target
replace 'Target' by 'M.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Moving
replace 'Moving' by 'Jacob,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
in:
replace 'in:' by '77-98.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
diversity,
replace 'diversity,' by 'pp.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
software
replace 'software' by 'Springer,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Compiler-generated
replace 'Compiler-generated' by 'Defense.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
2011.
replace '2011.' by 'Target'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
M.,
replace 'M.,' by 'Moving'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Franz,
replace 'Franz,' by 'in:'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
C.,
replace 'C.,' by 'diversity,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Wimmer,
replace 'Wimmer,' by 'software'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
S.,
replace 'S.,' by 'Compiler-generated'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Brunthaler,
replace 'Brunthaler,' by '2011.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
A.,
replace 'A.,' by 'M.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Gal,
replace 'Gal,' by 'Franz,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
G.,
replace 'G.,' by 'C.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Wagner,
replace 'Wagner,' by 'Wimmer,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
K.,
replace 'K.,' by 'S.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Manivannan,
replace 'Manivannan,' by 'Brunthaler,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
insert '' by 'Gal,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
insert '' by 'G.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Homescu,
replace 'Homescu,' by 'Wagner,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
B.,
replace 'B.,' by 'K.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Salamat,
replace 'Salamat,' by 'Manivannan,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
T.,
replace 'T.,' by 'A.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Jackson,
replace 'Jackson,' by 'Homescu,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
2696-2708.
replace '2696-2708.' by 'B.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
pp.
replace 'pp.' by 'Salamat,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
2021,
replace '2021,' by 'T.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Conference
replace 'Conference' by 'Jackson,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Web
replace 'Web' by '2696-2708.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
the
replace 'the' by 'pp.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
of
replace 'of' by '2021,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Proceedings
replace 'Proceedings' by 'Conference'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
in:
replace 'in:' by 'Web'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
cases,
replace 'cases,' by 'the'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
use
replace 'use' by 'of'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
languages,
replace 'languages,' by 'Proceedings'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Security,
replace 'Security,' by 'in'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
binaries:
replace 'binaries:' by 'cases,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
webassembly
replace 'webassembly' by 'use'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
real-world
replace 'real-world' by 'languages,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
of
replace 'of' by 'Security,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
study
replace 'study' by 'binaries:'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
empirical
replace 'empirical' by 'webassembly'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
An
replace 'An' by 'real-world'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
2021.
replace '2021.' by 'of'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
M.,
replace 'M.,' by 'study'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Pradel,
replace 'Pradel,' by 'empirical'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
D.,
replace 'D.,' by 'An'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Lehmann,
replace 'Lehmann,' by '2021.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
A.,
replace 'A.,' by 'M.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Hilbig,
replace 'Hilbig,' by 'Pradel,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
3062363.
replace '3062363.' by 'D.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
doi:10.1145/3062341.
replace 'doi:10.1145/3062341.' by 'Lehmann,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
3062363,
replace '3062363,' by 'A.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
https://doi.org/10.1145/3062341.
replace 'https://doi.org/10.1145/3062341.' by 'Hilbig,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
URL:
replace 'URL:' by '3062363.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
185-200.
replace '185-200.' by 'doi:10.1145/3062341.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
p.
replace 'p.' by '3062363,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
USA.
replace 'USA.' by 'https://doi.org/10.1145/3062341.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
NY,
replace 'NY,' by 'URL:'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
York,
replace 'York,' by '185-200.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
New
replace 'New' by 'p.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Machinery,
replace 'Machinery,' by 'USA.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Computing
replace 'Computing' by 'NY,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
for
replace 'for' by 'York,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Association
replace 'Association' by 'New'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Implementation,
replace 'Implementation,' by 'Machinery,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
and
replace 'and' by 'Computing'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Design
replace 'Design' by 'for'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Language
replace 'Language' by 'Association'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Programming
replace 'Programming' by 'Implementation,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
on
replace 'on' by 'and'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Conference
replace 'Conference' by 'Design'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
SIGPLAN
replace 'SIGPLAN' by 'Language'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
ACM
replace 'ACM' by 'Programming'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
38th
replace '38th' by 'on'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
the
replace 'the' by 'Conference'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
of
replace 'of' by 'SIGPLAN'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Proceedings
replace 'Proceedings' by 'ACM'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
in:
replace 'in:' by '38th'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
webassembly,
replace 'webassembly,' by 'the'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
with
replace 'with' by 'of'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
speed
replace 'speed' by 'Proceedings'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
to
replace 'to' by 'in:'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
up
replace 'up' by 'assembly,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
insert '' by 'with'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
insert '' by 'speed'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
insert '' by 'to'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
the
replace 'the' by 'up'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Bringing
replace 'Bringing' by 'web'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
2017b.
replace '2017b.' by 'the'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
J.,
replace 'J.,' by 'Bringing'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Bastien,
replace 'Bastien,' by '2017b.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
A.,
replace 'A.,' by 'J.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Zakai,
replace 'Zakai,' by 'Bastien,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
L.,
replace 'L.,' by 'A.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Wagner,
replace 'Wagner,' by 'Zakai,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
D.,
replace 'D.,' by 'L.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Gohman,
replace 'Gohman,' by 'Wagner,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
M.,
replace 'M.,' by 'D.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Holman,
replace 'Holman,' by 'Gohman,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
B.L.,
replace 'B.L.,' by 'M.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Titzer,
replace 'Titzer,' by 'Holman,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
D.L.,
replace 'D.L.,' by 'B.L.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Schuff,
replace 'Schuff,' by 'Titzer,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
A.,
replace 'A.,' by 'D.L.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Rossberg,
replace 'Rossberg,' by 'Schuff,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Haas,
replace 'Haas,' by 'Rossberg,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
185-200.
replace '185-200.' by 'A.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
pp.
replace 'pp.' by 'Haas,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Implementation,
replace 'Implementation,' by '185-200.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
and
replace 'and' by 'pp.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Design
replace 'Design' by 'Implementation,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Language
replace 'Language' by 'and'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Programming
replace 'Programming' by 'Design'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
on
replace 'on' by 'Language'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Conference
replace 'Conference' by 'Programming'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
SIGPLAN
replace 'SIGPLAN' by 'on'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
ACM
replace 'ACM' by 'Conference'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
38th
replace '38th' by 'SIGPLAN'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
the
replace 'the' by 'ACM'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
of
replace 'of' by '38th'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Proceedings
replace 'Proceedings' by 'the'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
in:
replace 'in:' by 'of'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
WebAssembly,
replace 'WebAssembly,' by 'Proceedings'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
with
replace 'with' by 'in:'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
speed
replace 'speed' by 'WebAssembly,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
to
replace 'to' by 'with'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
up
replace 'up' by 'speed'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
web
replace 'web' by 'to'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
the
replace 'the' by 'up'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
2017a.
replace '2017a.' by 'the'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
Bastien,
replace 'Bastien,' by '2017a.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
L.,
replace 'L.,' by 'A.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
https://github.com/PLSysSec/safeside.
replace 'https://github.com/PLSysSec/safeside.' by 'A.,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
URL:
replace 'URL:' by 'Haas,'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
insert '' by 'https://github.com/PLSysSec/safeside.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
in:
replace 'in:' by 'in'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
fastly.com/blog/
replace 'fastly.com/blog/' by 'Fastly.com/blog/'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
fastly.com/blog/the-power-of-serverless-at-the-edge.
replace 'fastly.com/blog/the-power-of-serverless-at-the-edge.' by 'Fastly.com/blog/the-power-of-serverless-at-the-edge.'
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. Duck, (30)G.J., (31)Gao, (32)X., (33)and (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. 3385972, (65)doi:10.1145/3385412. 3385972. D’Elia, (66)D.C., (67)Invidia, (68)L., (69)Palmaro, (70)F., (71)Querzoni, (72)L., (73)2022. Evaluating (74)dynamic (75)binary (76)instrumentation (77)systems (78)for (79)conspicuous (80)features (81)and (82)artifacts. Digital (83)Threats (84)3. URL: (85)https://doi.org/10.1145/3478520, (86)doi:10.1145/3478520. Fastly, (87)2020. The (88)power (89)of (90)serverless, (91)72 (92)times (93)over. URL: (94)https://www. Fastly.com/blog/the-power-of-serverless-at-the-edge. Fastly, (95)2021. Stop (96)a (97)wasm (98)compiler (99)bug (100)before (101)it (102)becomes (103)a (104)problem (105)| (106)fastly. https://www. Fastly.com/blog/ (107)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. Forrest, (108)S., (109)Somayaji, (110)A., (111)and (112)Ackley, (113)D., (114)1997. Building (115)diverse (116)computer (117)systems, (118)in (119)Proceedings. The (120)Sixth (121)Workshop (122)on (123)Hot (124)Topics (125)in (126)Operating (127)Systems (128)(Cat. No.97TB100133), (129)pp. 67-72. doi:10.1109/HOTOS. 1997.595185. Google, (130)2020. Safeside. https://github.com/PLSysSec/safeside. https://github.com/PLSysSec/safeside. Haas, (131)A., (132)Rossberg, (133)A., (134)Schuff, (135)D.L., (136)Titzer, (137)B.L., (138)Holman, (139)M., (140)Gohman, (141)D., (142)Wagner, (143)L., (144)Zakai, (145)A., (146)Bastien, (147)J., (148)2017a. Bringing (149)the (150)web (151)up (152)to (153)speed (154)with (155)WebAssembly, (156)in: (157)Proceedings (158)of (159)the (160)38th (161)ACM (162)SIGPLAN (163)Conference (164)on (165)Programming (166)Language (167)Design (168)and (169)Implementation, (170)pp. 185-200. Haas, (171)A., (172)Rossberg, (173)A., (174)Schuff, (175)D.L., (176)Titzer, (177)B.L., (178)Holman, (179)M., (180)Gohman, (181)D., (182)Wagner, (183)L., (184)Zakai, (185)A., (186)Bastien, (187)J., (188)2017b. Bringing (189)the (190)web (191)up (192)to (193)speed (194)with (195)web (196)assembly, (197)in: (198)Proceedings (199)of (200)the (201)38th (202)ACM (203)SIGPLAN (204)Conference (205)on (206)Programming (207)Language (208)Design (209)and (210)Implementation, (211)Association (212)for (213)Computing (214)Machinery, (215)New (216)York, (217)NY, (218)USA. p. 185-200. URL: (219)https://doi.org/10.1145/3062341. 3062363, (220)doi:10.1145/3062341. 3062363. Hilbig, (221)A., (222)Lehmann, (223)D., (224)Pradel, (225)M., (226)2021. An (227)empirical (228)study (229)of (230)real-world (231)webassembly (232)binaries: (233)Security, (234)languages, (235)use (236)cases, (237)in (238)Proceedings (239)of (240)the (241)Web (242)Conference (243)2021, (244)pp. 2696-2708. Jackson, (245)T., (246)Salamat, (247)B., (248)Homescu, (249)A., (250)Manivannan, (251)K., (252)Wagner, (253)G., (254)Gal, (255)A., (256)Brunthaler, (257)S., (258)Wimmer, (259)C., (260)Franz, (261)M., (262)2011. Compiler-generated (263)software (264)diversity, (265)in: (266)Moving (267)Target (268)Defense. Springer, (269)pp. 77-98. Jacob, (270)M., (271)Jakubowski, (272)M.H., (273)Naldurg, (274)P., (275)Saw, (276)C.W.N., (277)and (278)Venkatesan, (279)R., (280)2008. The (281)superdiversifier: (282)Peephole (283)individualization (284)for (285)soft-ware (286)protection, (287)in: (288)International (289)Workshop (290)on (291)Security, (292)Springer. pp. 100-120. Jetbrain, (293)2023. Kotlin (294)wasm. https://kotlinlang.org/docs/ (295)wasm-overview. html. URL (296)= (297)https://kotlinlang.org/docs/ (298)wasm-overview. html. Kim, (299)M., (300)Jang, (301)H., (302)Shin, (303)Y., (304)2022. Avengers, (305)assemble! (306)survey (307)of (308)webassembly (309)security (310)solutions, (311)in: (312)2022 (313)IEEE (314)15th (315)International (316)Conference (317)on (318)Cloud (319)Computing (320)(CLOUD), (321)pp. 543-553. doi:10. 1109/CLOUD55607. 2022.00077. Kocher, (322)P., (323)Horn, (324)J., (325)Fogh, (326)A., (327)Genkin, (328)D., (329)Gruss, (330)D., (331)Haas, (332)W., (333)Hamburg, (334)M., (335)Lipp, (336)M., (337)Prescher, (338)T., (339)Schwarz, (340)M., (341)Yarom, (342)Y., (343)2019. Spectre (344)attacks: (345)Exploiting (346)speculative (347)execution, (348)in: (349)2019 (350)IEEE (351)Symposium (352)on (353)Security (354)and (355)Privacy (356)(SP), (357)pp. 1-19. doi:10.1109/SP. 2019 (358)is (359)the (360)year (361)of (362)2019. 00002. Koppel, (363)J., (364)Guo, (365)Z., (366)de (367)Vries, (368)E., (369)Solar-Lezama, (370)A., (371)and (372)Polikarpova, (373)N., (374)2022. Searching (375)entangled (376)program (377)spaces. Proc. ACM (378)Program. Lang. 6. URL: (379)https://doi.org/10.1145/3547622, (380)doi:10. 1145/3547622. Le, (381)V., (382)Afshari, (383)M., (384)Su, (385)Z., (386)2014. Compiler (387)validation (388)via (389)equivalence (390)modulo (391)inputs, (392)in: (393)Proceedings (394)of (395)the (396)35th (397)ACM (398)SIGPLAN (399)Conference (400)on (401)Programming (402)Language (403)Design (404)and (405)Implementation, (406)Association (407)for (408)Computing (409)Machinery, (410)New (411)York, (412)NY, (413)USA. p. 216-226. URL: (414)https://doi.org/10.1145/2594291. 2594334, (415)doi:10. 1145/2594291. 2594334.
(0)[16] (1)[17] (2)[18] (3)[19] (4)[20] (5)[21] (6)[22] (7)[23] (8)[24] (9)[25] (10)[26] (11)[27] (12)[28] (13)[29] (14)[30] (15)[31] (16)[32] (17)Dongarra, (18)J.J., (19)Hinds, (20)A., (21)1979. Unrolling (22)loops (23)in (24)fortran. Software: (25)Practice (26)and (27)Experience (28)9, (29)219-226. (30)Duck, (31)G.J., (32)Gao, (33)X., (34)Roychoudhury, (35)A., (36)2020. Binary (37)rewriting (38)without (39)control (40)flow (41)recovery, (42)in: (43)Proceedings (44)of (45)the (46)41st (47)ACM (48)SIGPLAN (49)Conference (50)on (51)Programming (52)Language (53)Design (54)and (55)Implementation, (56)Association (57)for (58)Computing (59)Machinery, (60)New (61)York, (62)NY, (63)USA. p. 151-163. URL: (64)https://doi.org/10.1145/3385412. (65)3385972, (66)doi:10.1145/3385412. 3385972. (67)D’Elia, (68)D.C., (69)Invidia, (70)L., (71)Palmaro, (72)F., (73)Querzoni, (74)L., (75)2022. Evaluating (76)dynamic (77)binary (78)instrumentation (79)systems (80)for (81)conspicuous (82)features (83)and (84)artifacts. Digital (85)Threats (86)3. URL: (87)https://doi.org/10.1145/3478520, (88)doi:10.1145/3478520. (89)Fastly, (90)2020. The (91)power (92)of (93)serverless, (94)72 (95)times (96)over. URL: (97)https://www. fastly.com/blog/the-power-of-serverless-at-the-edge. (98)Fastly, (99)2021. Stop (100)a (101)wasm (102)compiler (103)bug (104)before (105)it (106)becomes (107)a (108)problem (109)| (110)fastly. https://www. fastly.com/blog/ (111)defense-in-depth-stopping-a-wasm-compiler-bug-before-it-became-a-problem. (112)Forrest, (113)S., (114)Somayaji, (115)A., (116)Ackley, (117)D., (118)1997. Building (119)diverse (120)computer (121)systems, (122)in: (123)Proceedings. The (124)Sixth (125)Workshop (126)on (127)Hot (128)Topics (129)in (130)Operating (131)Systems (132)(Cat. No.97TB100133), (133)pp. 67-72. (134)doi:10.1109/HOTOS. 1997.595185. (135)Google, (136)2020. Safeside. https://github.com/PLSysSec/safeside. (137)URL: (138)https://github.com/PLSysSec/safeside. (139)Haas, (140)A., (141)Rossberg, (142)A., (143)Schuff, (144)D.L., (145)Titzer, (146)B.L., (147)Holman, (148)M., (149)Gohman, (150)D., (151)Wagner, (152)L., (153)Zakai, (154)A., (155)Bastien, (156)J., (157)2017a. Bringing (158)the (159)web (160)up (161)to (162)speed (163)with (164)WebAssembly, (165)in: (166)Proceedings (167)of (168)the (169)38th (170)ACM (171)SIGPLAN (172)Conference (173)on (174)Programming (175)Language (176)Design (177)and (178)Implementation, (179)pp. 185-200. (180)Haas, (181)A., (182)Rossberg, (183)A., (184)Schuff, (185)D.L., (186)Titzer, (187)B.L., (188)Holman, (189)M., (190)Gohman, (191)D., (192)Wagner, (193)L., (194)Zakai, (195)A., (196)Bastien, (197)J., (198)2017b. Bringing (199)the (200)web (201)up (202)to (203)speed (204)with (205)webassembly, (206)in: (207)Proceedings (208)of (209)the (210)38th (211)ACM (212)SIGPLAN (213)Conference (214)on (215)Programming (216)Language (217)Design (218)and (219)Implementation, (220)Association (221)for (222)Computing (223)Machinery, (224)New (225)York, (226)NY, (227)USA. p. 185-200. URL: (228)https://doi.org/10.1145/3062341. (229)3062363, (230)doi:10.1145/3062341. 3062363. (231)Hilbig, (232)A., (233)Lehmann, (234)D., (235)Pradel, (236)M., (237)2021. An (238)empirical (239)study (240)of (241)real-world (242)webassembly (243)binaries: (244)Security, (245)languages, (246)use (247)cases, (248)in: (249)Proceedings (250)of (251)the (252)Web (253)Conference (254)2021, (255)pp. 2696-2708. (256)Jackson, (257)T., (258)Salamat, (259)B., (260)Homescu, (261)A., (262)Manivannan, (263)K., (264)Wagner, (265)G., (266)Gal, (267)A., (268)Brunthaler, (269)S., (270)Wimmer, (271)C., (272)Franz, (273)M., (274)2011. Compiler-generated (275)software (276)diversity, (277)in: (278)Moving (279)Target (280)Defense. Springer, (281)pp. 77-98. (282)Jacob, (283)M., (284)Jakubowski, (285)M.H., (286)Naldurg, (287)P., (288)Saw, (289)C.W.N., (290)Venkatesan, (291)R., (292)2008. The (293)superdiversifier: (294)Peephole (295)individualization (296)for (297)soft-ware (298)protection, (299)in: (300)International (301)Workshop (302)on (303)Security, (304)Springer. (305)pp. 100-120. (306)Jetbrain, (307)2023. Kotlin (308)wasm. https://kotlinlang.org/docs/ (309)wasm-overview. html. URL: (310)= (311)https://kotlinlang.org/docs/ (312)wasm-overview. html. (313)Kim, (314)M., (315)Jang, (316)H., (317)Shin, (318)Y., (319)2022. Avengers, (320)assemble! (321)survey (322)of (323)webassembly (324)security (325)solutions, (326)in: (327)2022 (328)IEEE (329)15th (330)International (331)Conference (332)on (333)Cloud (334)Computing (335)(CLOUD), (336)pp. 543-553. doi:10. (337)1109/CLOUD55607. 2022.00077. (338)Kocher, (339)P., (340)Horn, (341)J., (342)Fogh, (343)A., (344)Genkin, (345)D., (346)Gruss, (347)D., (348)Haas, (349)W., (350)Hamburg, (351)M., (352)Lipp, (353)M., (354)Mangard, (355)S., (356)Prescher, (357)T., (358)Schwarz, (359)M., (360)Yarom, (361)Y., (362)2019. Spectre (363)attacks: (364)Exploiting (365)speculative (366)execution, (367)in: (368)2019 (369)IEEE (370)Symposium (371)on (372)Security (373)and (374)Privacy (375)(SP), (376)pp. 1-19. (377)doi:10.1109/SP. 2019. 00002. (378)Koppel, (379)J., (380)Guo, (381)Z., (382)de (383)Vries, (384)E., (385)Solar-Lezama, (386)A., (387)Polikarpova, (388)N., (389)2022. Searching (390)entangled (391)program (392)spaces. Proc. ACM (393)Program. Lang. 6. URL: (394)https://doi.org/10.1145/3547622, (395)doi:10. (396)1145/3547622. (397)Le, (398)V., (399)Afshari, (400)M., (401)Su, (402)Z., (403)2014. Compiler (404)validation (405)via (406)equivalence (407)modulo (408)inputs, (409)in: (410)Proceedings (411)of (412)the (413)35th (414)ACM (415)SIGPLAN (416)Conference (417)on (418)Programming (419)Language (420)Design (421)and (422)Implementation, (423)Association (424)for (425)Computing (426)Machinery, (427)New (428)York, (429)NY, (430)USA. p. (431)216-226. URL: (432)https://doi.org/10.1145/2594291. 2594334, (433)doi:10. (434)1145/2594291. 2594334.
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)24 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)24 (5)of (6)25
H.,
replace 'H.,' by 'and'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
Zwaan,
replace 'Zwaan,' by 'H.,'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
A.,
replace 'A.,' by 'Zwaan,'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
Nezhad,
replace 'Nezhad,' by 'A.,'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
Soldani
replace 'Soldani' by 'Nezhad,'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
A.,
replace 'A.,' by 'Soldani'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
Marino,
replace 'Marino,' by 'A.,'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
M.,
replace 'M.,' by 'Marino,'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
Mayer,
replace 'Mayer,' by 'M.,'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
L.,
replace 'L.,' by 'Mayer,'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
Wagner,
replace 'Wagner,' by 'L.,'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
1480915.
replace '1480915.' by 'Wagner,'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
doi:10.1145/1480881.
replace 'doi:10.1145/1480881.' by '1480915.'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
1480915,
replace '1480915,' by 'doi:10.1145/1480881.'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
1480881.
replace '1480881.' by '1480915,'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
https://doi.org/10.1145/
replace 'https://doi.org/10.1145/' by 'https://doi.org/10.1145/1480881.'
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/1480881. 1480915, (43)doi:10.1145/1480881. 1480915. Wagner, (44)L., (45)Mayer, (46)M., (47)Marino, (48)A., (49)Soldani (50)Nezhad, (51)A., (52)Zwaan, (53)H., (54)and (55)Malavolta, (56)I., (57)2023. On (58)the (59)energy (60)consumption (61)and (62)performance (63)of (64)webassembly (65)binaries (66)across (67)programming (68)languages (69)and (70)runtimes (71)in (72)iot, (73)in: (74)Proceedings (75)of (76)the (77)27th (78)International (79)Conference (80)on (81)Evaluation (82)and (83)Assessment (84)in (85)Software (86)Engineering, (87)Association (88)for (89)Computing (90)Machinery, (91)New (92)York, (93)NY, (94)USA. p. 72-82. URL: (95)https://doi.org/10.1145/3593434. 3593454, (96)doi:10.1145/3593434. 3593454. Wang, (97)J., (98)Chen, (99)B., (100)Wei, (101)L., (102)Liu, (103)Y., (104)2017. Skyfire: (105)Data-driven (106)seed (107)generation (108)for (109)fuzzing, (110)in: (111)2017 (112)IEEE (113)Symposium (114)on (115)Security (116)and (117)Privacy (118)(SP), (119)pp. 579-594. doi:10.1109/SP. 2017.23. Wen, (120)E., (121)Dietrich, (122)J., (123)2023. Wasmslim: (124)Optimizing (125)webassembly (126)binary (127)distribution (128)via (129)automatic (130)module (131)splitting, (132)in: (133)2023 (134)IEEE (135)International (136)Conference (137)on (138)Software (139)Analysis, (140)Evolution (141)and (142)Reengineering (143)(SANER), (144)pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, (145)M., (146)Nandi, (147)C., (148)Wang, (149)Y.R., (150)Flatt, (151)O., (152)Tatlock, (153)Z., (154)Panchekha, (155)P., (156)2021. Egg: (157)Fast (158)and (159)extensible (160)equality (161)saturation. Proc. ACM (162)Program. Lang. 5. URL: (163)https://doi.org/10.1145/3434304, (164)doi:10. 1145/3434304.
(0)[46] (1)[47] (2)[48] (3)[49] (4)[50] (5)Tate, (6)R., (7)Stepp, (8)M., (9)Tatlock, (10)Z., (11)Lerner, (12)S., (13)2009. Equality (14)saturation: (15)A (16)new (17)approach (18)to (19)optimization, (20)in: (21)Proceedings (22)of (23)the (24)36th (25)Annual (26)ACM (27)SIGPLAN-SIGACT (28)Symposium (29)on (30)Principles (31)of (32)Programming (33)Languages, (34)Association (35)for (36)Computing (37)Machinery, (38)New (39)York, (40)NY, (41)USA. p. 264-276. URL: (42)https://doi.org/10.1145/ (43)1480881. 1480915, (44)doi:10.1145/1480881. 1480915. (45)Wagner, (46)L., (47)Mayer, (48)M., (49)Marino, (50)A., (51)Soldani (52)Nezhad, (53)A., (54)Zwaan, (55)H., (56)Malavolta, (57)I., (58)2023. On (59)the (60)energy (61)consumption (62)and (63)performance (64)of (65)webassembly (66)binaries (67)across (68)programming (69)languages (70)and (71)runtimes (72)in (73)iot, (74)in: (75)Proceedings (76)of (77)the (78)27th (79)International (80)Conference (81)on (82)Evaluation (83)and (84)Assessment (85)in (86)Software (87)Engineering, (88)Association (89)for (90)Computing (91)Machinery, (92)New (93)York, (94)NY, (95)USA. p. 72-82. URL: (96)https://doi.org/10.1145/3593434. 3593454, (97)doi:10.1145/3593434. 3593454. (98)Wang, (99)J., (100)Chen, (101)B., (102)Wei, (103)L., (104)Liu, (105)Y., (106)2017. Skyfire: (107)Data-driven (108)seed (109)generation (110)for (111)fuzzing, (112)in: (113)2017 (114)IEEE (115)Symposium (116)on (117)Security (118)and (119)Privacy (120)(SP), (121)pp. 579-594. doi:10.1109/SP. 2017.23. (122)Wen, (123)E., (124)Dietrich, (125)J., (126)2023. Wasmslim: (127)Optimizing (128)webassembly (129)binary (130)distribution (131)via (132)automatic (133)module (134)splitting, (135)in: (136)2023 (137)IEEE (138)International (139)Conference (140)on (141)Software (142)Analysis, (143)Evolution (144)and (145)Reengineering (146)(SANER), (147)pp. 673-677. doi:10.1109/SANER56733. 2023. (148)00069. (149)Willsey, (150)M., (151)Nandi, (152)C., (153)Wang, (154)Y.R., (155)Flatt, (156)O., (157)Tatlock, (158)Z., (159)Panchekha, (160)P., (161)2021. Egg: (162)Fast (163)and (164)extensible (165)equality (166)saturation. Proc. ACM (167)Program. Lang. 5. URL: (168)https://doi.org/10.1145/3434304, (169)doi:10. (170)1145/3434304.
doi
This sentence does not start with an uppercase letter.
[46] [47] [48] [49] [50] Tate, R., Stepp, M., Tatlock, Z., Lerner, S., 2009. Equality saturation: A new approach to optimization, in: Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Association for Computing Machinery, New York, NY, USA. p. 264-276. URL: https://doi.org/10.1145/ 1480881. 1480915, doi:10.1145/1480881. 1480915. Wagner, L., Mayer, M., Marino, A., Soldani Nezhad, A., Zwaan, H., Malavolta, I., 2023. On the energy consumption and performance of webassembly binaries across programming languages and runtimes in iot, in: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, Association for Computing Machinery, New York, NY, USA. p. 72-82. URL: https://doi.org/10.1145/3593434. 3593454, doi:10.1145/3593434. 3593454. Wang, J., Chen, B., Wei, L., Liu, Y., 2017. Skyfire: Data-driven seed generation for fuzzing, in: 2017 IEEE Symposium on Security and Privacy (SP), pp. 579-594. doi:10.1109/SP. 2017.23. Wen, E., Dietrich, J., 2023. Wasmslim: Optimizing webassembly binary distribution via automatic module splitting, in: 2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 673-677. doi:10.1109/SANER56733. 2023. 00069. Willsey, M., Nandi, C., Wang, Y.R., Flatt, O., Tatlock, Z., Panchekha, P., 2021. Egg: Fast and extensible equality saturation. Proc. ACM Program. Lang. 5. URL: https://doi.org/10.1145/3434304, doi:10. 1145/3434304.
267.
delete '267.' by ''
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
247—
replace '247—' by '247—267.'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
javascript,
replace 'javascript,' by 'Javascript,'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
arXiv
replace 'arXiv' by 'ArXiv'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
https://doi.
replace 'https://doi.' by 'https://doi.org.'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
An
replace 'An' by 'an'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
in:
replace 'in:' by 'in'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
usenix.
replace 'usenix.' by 'Usenix.'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
in:
replace 'in:' by 'in'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
V.J.,
delete 'V.J.,' by ''
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
Reddi,
replace 'Reddi,' by 'and'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
S.,
replace 'S.,' by 'V.J.,'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
Wallace,
replace 'Wallace,' by 'Reddi,'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
G.,
replace 'G.,' by 'S.,'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
Lowney,
replace 'Lowney,' by 'Wallace,'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
A.,
replace 'A.,' by 'G.,'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
Klauser,
replace 'Klauser,' by 'Lowney,'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
H.,
replace 'H.,' by 'A.,'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
Patil,
replace 'Patil,' by 'Klauser,'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
R.,
replace 'R.,' by 'H.,'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
Muth,
replace 'Muth,' by 'Patil,'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
insert '' by 'Muth,'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
insert '' by 'R.,'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
arXiv
replace 'arXiv' by 'ArXiv'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
https://doi.
replace 'https://doi.' by 'https://doi.org.'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
in:
replace 'in:' by 'in'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
dynami-cally
replace 'dynami-cally' by 'dynamically'
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynamically (22)analyzing (23)webassembly, (24)in (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi.org. org/10.1145/3297858. 3304068, (49)doi:10. 1145/3297858. 3304068. Loose, (50)N., (51)Machtle, (52)F., (53)Pott, (54)C., (55)Bezsmertnyi, (56)V., (57)Eisenbarth, (58)T., (59)2023. Madvex: (60)Instrumentation-based (61)Adversarial (62)Attacks (63)on (64)Machine (65)Learning (66)Malware (67)Detection. ArXiv (68)e-prints (69), (70)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (71)arXiv: (72)2305. 02559. Luk, (73)C.K., (74)Cohn, (75)R., (76)Muth, (77)R., (78)Patil, (79)H., (80)Klauser, (81)A., (82)Lowney, (83)G., (84)Wallace, (85)S., (86)Reddi, (87)V.J., (88)and (89)Hazelwood, (90)K., (91)2005. Pin: (92)building (93)customized (94)program (95)analysis (96)tools (97)with (98)dynamic (99)instrumentation. Acm (100)sigplan (101)notices (102)40, (103)190-200. Lundquist, (104)G.R., (105)Mohan, (106)V., (107)Hamlen, (108)K.W., (109)2016. Searching (110)for (111)software (112)diversity: (113)attaining (114)artificial (115)diversity (116)through (117)program (118)synthesis, (119)in: (120)Proceedings (121)of (122)the (123)2016 (124)New (125)Security (126)Paradigms (127)Workshop, (128)pp. 80-91. Nandi, (129)C., (130)Willsey, (131)M., (132)Anderson, (133)A., (134)Wilcox, (135)J.R., (136)Darulova, (137)E., (138)Grossman, (139)D., (140)Tatlock, (141)Z., (142)2020. Synthesizing (143)structured (144)cad (145)models (146)with (147)equality (148)saturation (149)and (150)inverse (151)transformations, (152)in (153)Proceedings (154)of (155)the (156)41st (157)ACM (158)SIGPLAN (159)Conference (160)on (161)Programming (162)Language (163)Design (164)and (165)Implementation, (166)Association (167)for (168)Computing (169)Machinery, (170)New (171)York, (172)NY, (173)USA. p. 31-44. URL: (174)https://doi.org/10.1145/ (175)3385412. 3386012, (176)doi:10. 1145/3385412. 3386012. Narayan, (177)S., (178)Disselkoen, (179)C., (180)Moghimi, (181)D., (182)Cauligi, (183)S., (184)Johnson, (185)E., (186)Gang, (187)Z., (188)Vahldiek-Oberwagner, (189)A., (190)Sahita, (191)R., (192)Shacham, (193)H., (194)Tullsen, (195)D., (196)Stefan, (197)D., (198)2021. Swivel: (199)Hardening (200)WebAssembly (201)against (202)spectre, (203)in: (204)30th (205)USENIX (206)Security (207)Symposium (208)(USENIX (209)Security (210)21), (211)USENIX (212)Association. pp. 1433-1450. URL: (213)https:// (214)www. Usenix. org/conference/usenixsecurity21/presentation/narayan. Premtoon, (215)V., (216)Koppel, (217)J., (218)Solar-Lezama, (219)A., (220)2020. Semantic (221)code (222)search (223)via (224)equational (225)reasoning, (226)in (227)Proceedings (228)of (229)the (230)41st (231)ACM (232)SIGPLAN (233)Conference (234)on (235)Programming (236)Language (237)Design (238)and (239)Implementation, (240)Association (241)for (242)Computing (243)Machinery, (244)New (245)York, (246)NY, (247)USA. p. 1066-1082. URL: (248)https://doi.org/10.1145/3385412. 3386001, (249)doi:10.1145/3385412. 3386001. Ren, (250)X., (251)Ho, (252)M., (253)Ming, (254)J., (255)Lei, (256)Y., (257)Li, (258)L., (259)2021. Unleashing (260)the (261)hidden (262)power (263)of (264)compiler (265)optimization (266)on (267)binary (268)code (269)difference: (270)an (271)empirical (272)study, (273)in: (274)Proceedings (275)of (276)the (277)42nd (278)ACM (279)SIGPLAN (280)International (281)Conference (282)on (283)Programming (284)Language (285)Design (286)and (287)Implementation, (288)Association (289)for (290)Computing (291)Machinery, (292)New (293)York, (294)NY, (295)USA. p. 142-157. URL: (296)https://doi.org/10.1145/3453483. 3454035, (297)doi:10.1145/3453483. 3454035. Rokicki, (298)T., (299)Maurice, (300)C., (301)Botvinnik, (302)M., (303)Oren, (304)Y., (305)2022. Port (306)contention (307)goes (308)portable: (309)Port (310)contention (311)side (312)channels (313)in (314)web (315)browsers, (316)in: (317)Proceedings (318)of (319)the (320)2022 (321)ACM (322)on (323)Asia (324)Conference (325)on (326)Computer (327)and (328)Communications (329)Security, (330)Association (331)for (332)Computing (333)Machinery, (334)New (335)York, (336)NY, (337)USA. p. 1182-1194. URL: (338)https://doi.org. org/10.1145/3488932. 3517411, (339)doi:10.1145/3488932. 3517411. Rossberg, (340)A., (341)2019. WebAssembly (342)Core (343)Specification. Technical (344)Report. W3C. URL: (345)https://www.w3.org/TR/wasm-core-1/. Sasnauskas, (346)R., (347)Chen, (348)Y., (349)Collingbourne, (350)P., (351)Ketema, (352)J., (353)Lup, (354)G., (355)Taneja, (356)J., (357)Regehr, (358)J., (359)2017. Souper: (360)A (361)Synthesizing (362)Superoptimizer. ArXiv (363)e-prints (364), (365)arXiv:1711.04422doi:10.48550/ (366)arXiv.1711.04422, (367)arXiv:1711.04422. Schwarz, (368)M., (369)Maurice, (370)C., (371)Gruss, (372)D., (373)Mangard, (374)S., (375)2017. Fantastic (376)timers (377)and (378)where (379)to (380)find (381)them: (382)High-resolution (383)microarchitectural (384)attacks (385)in (386)Javascript, (387)in: (388)Kiayias, (389)A. (Ed.), (390)Financial (391)Cryptography (392)and (393)Data (394)Security, (395)Springer (396)International (397)Publishing, (398)Cham. pp. 247—267. Stiévenart, (399)Q., (400)De (401)Roover, (402)C., (403)2020. Compositional (404)information (405)flow (406)analysis (407)for (408)webassembly (409)programs, (410)in: (411)2020 (412)IEEE (413)20th (414)International (415)Working (416)Conference (417)on (418)Source (419)Code (420)Analysis (421)and (422)Manipulation (423)(SCAM), (424)IEEE. pp. 13-24.
(0)[33] (1)[34] (2)[35] (3)[36] (4)[37] (5)[38] (6)[39] (7)[40] (8)[41] (9)[42] (10)[43] (11)[44] (12)[45] (13)Lehmann, (14)D., (15)Pradel, (16)M., (17)2019. Wasabi: (18)A (19)framework (20)for (21)dynami-cally (22)analyzing (23)webassembly, (24)in: (25)Proceedings (26)of (27)the (28)Twenty-Fourth (29)International (30)Conference (31)on (32)Architectural (33)Support (34)for (35)Programming (36)Languages (37)and (38)Operating (39)Systems, (40)Association (41)for (42)Computing (43)Machinery, (44)New (45)York, (46)NY, (47)USA. p. 1045-1058. URL: (48)https://doi. (49)org/10.1145/3297858. 3304068, (50)doi:10. 1145/3297858. 3304068. (51)Loose, (52)N., (53)Machtle, (54)F., (55)Pott, (56)C., (57)Bezsmertnyi, (58)V., (59)Eisenbarth, (60)T., (61)2023. Madvex: (62)Instrumentation-based (63)Adversarial (64)Attacks (65)on (66)Machine (67)Learning (68)Malware (69)Detection. arXiv (70)e-prints (71), (72)arXiv:2305.02559doi:10. 48550/arXiv.2305.02559, (73)arXiv: (74)2305. 02559. (75)Luk, (76)C.K., (77)Cohn, (78)R., (79)Muth, (80)R., (81)Patil, (82)H., (83)Klauser, (84)A., (85)Lowney, (86)G., (87)Wallace, (88)S., (89)Reddi, (90)V.J., (91)Hazelwood, (92)K., (93)2005. Pin: (94)building (95)customized (96)program (97)analysis (98)tools (99)with (100)dynamic (101)instrumentation. (102)Acm (103)sigplan (104)notices (105)40, (106)190-200. (107)Lundquist, (108)G.R., (109)Mohan, (110)V., (111)Hamlen, (112)K.W., (113)2016. Searching (114)for (115)software (116)diversity: (117)attaining (118)artificial (119)diversity (120)through (121)program (122)synthesis, (123)in: (124)Proceedings (125)of (126)the (127)2016 (128)New (129)Security (130)Paradigms (131)Workshop, (132)pp. 80-91. (133)Nandi, (134)C., (135)Willsey, (136)M., (137)Anderson, (138)A., (139)Wilcox, (140)J.R., (141)Darulova, (142)E., (143)Grossman, (144)D., (145)Tatlock, (146)Z., (147)2020. Synthesizing (148)structured (149)cad (150)models (151)with (152)equality (153)saturation (154)and (155)inverse (156)transformations, (157)in: (158)Proceedings (159)of (160)the (161)41st (162)ACM (163)SIGPLAN (164)Conference (165)on (166)Programming (167)Language (168)Design (169)and (170)Implementation, (171)Association (172)for (173)Computing (174)Machinery, (175)New (176)York, (177)NY, (178)USA. p. 31-44. URL: (179)https://doi.org/10.1145/ (180)3385412. 3386012, (181)doi:10. 1145/3385412. 3386012. (182)Narayan, (183)S., (184)Disselkoen, (185)C., (186)Moghimi, (187)D., (188)Cauligi, (189)S., (190)Johnson, (191)E., (192)Gang, (193)Z., (194)Vahldiek-Oberwagner, (195)A., (196)Sahita, (197)R., (198)Shacham, (199)H., (200)Tullsen, (201)D., (202)Stefan, (203)D., (204)2021. Swivel: (205)Hardening (206)WebAssembly (207)against (208)spectre, (209)in: (210)30th (211)USENIX (212)Security (213)Symposium (214)(USENIX (215)Security (216)21), (217)USENIX (218)Association. pp. 1433-1450. URL: (219)https:// (220)www. usenix. org/conference/usenixsecurity21/presentation/narayan. (221)Premtoon, (222)V., (223)Koppel, (224)J., (225)Solar-Lezama, (226)A., (227)2020. Semantic (228)code (229)search (230)via (231)equational (232)reasoning, (233)in: (234)Proceedings (235)of (236)the (237)41st (238)ACM (239)SIGPLAN (240)Conference (241)on (242)Programming (243)Language (244)Design (245)and (246)Implementation, (247)Association (248)for (249)Computing (250)Machinery, (251)New (252)York, (253)NY, (254)USA. p. 1066-1082. URL: (255)https://doi.org/10.1145/3385412. (256)3386001, (257)doi:10.1145/3385412. 3386001. (258)Ren, (259)X., (260)Ho, (261)M., (262)Ming, (263)J., (264)Lei, (265)Y., (266)Li, (267)L., (268)2021. Unleashing (269)the (270)hidden (271)power (272)of (273)compiler (274)optimization (275)on (276)binary (277)code (278)difference: (279)An (280)empirical (281)study, (282)in: (283)Proceedings (284)of (285)the (286)42nd (287)ACM (288)SIGPLAN (289)International (290)Conference (291)on (292)Programming (293)Language (294)Design (295)and (296)Implementation, (297)Association (298)for (299)Computing (300)Machinery, (301)New (302)York, (303)NY, (304)USA. p. 142-157. URL: (305)https://doi.org/10.1145/3453483. (306)3454035, (307)doi:10.1145/3453483. 3454035. (308)Rokicki, (309)T., (310)Maurice, (311)C., (312)Botvinnik, (313)M., (314)Oren, (315)Y., (316)2022. Port (317)contention (318)goes (319)portable: (320)Port (321)contention (322)side (323)channels (324)in (325)web (326)browsers, (327)in: (328)Proceedings (329)of (330)the (331)2022 (332)ACM (333)on (334)Asia (335)Conference (336)on (337)Computer (338)and (339)Communications (340)Security, (341)Association (342)for (343)Computing (344)Machinery, (345)New (346)York, (347)NY, (348)USA. p. 1182-1194. URL: (349)https://doi. (350)org/10.1145/3488932. 3517411, (351)doi:10.1145/3488932. 3517411. (352)Rossberg, (353)A., (354)2019. WebAssembly (355)Core (356)Specification. Technical (357)Report. W3C. URL: (358)https://www.w3.org/TR/wasm-core-1/. (359)Sasnauskas, (360)R., (361)Chen, (362)Y., (363)Collingbourne, (364)P., (365)Ketema, (366)J., (367)Lup, (368)G., (369)Taneja, (370)J., (371)Regehr, (372)J., (373)2017. Souper: (374)A (375)Synthesizing (376)Superoptimizer. arXiv (377)e-prints (378), (379)arXiv:1711.04422doi:10.48550/ (380)arXiv.1711.04422, (381)arXiv:1711.04422. (382)Schwarz, (383)M., (384)Maurice, (385)C., (386)Gruss, (387)D., (388)Mangard, (389)S., (390)2017. Fantastic (391)timers (392)and (393)where (394)to (395)find (396)them: (397)High-resolution (398)microarchitectural (399)attacks (400)in (401)javascript, (402)in: (403)Kiayias, (404)A. (Ed.), (405)Financial (406)Cryptography (407)and (408)Data (409)Security, (410)Springer (411)International (412)Publishing, (413)Cham. pp. 247— (414)267. (415)Stiévenart, (416)Q., (417)De (418)Roover, (419)C., (420)2020. Compositional (421)information (422)flow (423)analysis (424)for (425)webassembly (426)programs, (427)in: (428)2020 (429)IEEE (430)20th (431)International (432)Working (433)Conference (434)on (435)Source (436)Code (437)Analysis (438)and (439)Manipulation (440)(SCAM), (441)IEEE. pp. 13-24.
25
replace '25' by '25.'
(0)Cabrera-Arteaga (1)et (2)al. Page (3)25 (4)of (5)25.
(0)Cabrera-Arteaga (1)et (2)al. (3)Page (4)25 (5)of (6)25